Cybersecurity
Learn more about Cybersecurity
Admission Requirements
None.
This program does not have specific admission requirements. Only admission to Kennesaw State University is required to declare this major.
General Education Core Curriculum Requirements Specific to This Major
Area A2: Students must take MATH 1113 or higher.
Area D1: Students must take MATH 1179 or higher.
Area D2: Select two course pairs from the following (8 Credit Hours): CHEM 1211/L, CHEM 1212/L, PHYS 1111/L*, PHYS 1112/L, PHYS 2211/L*, PHYS 2212/L, BIOL 1107/L, or BIOL 1108/L. *Students cannot take both PHYS 1111/L and PHYS 2211/L nor PHYS 1112/L and PHYS 2212/L.
Tracks Available
- Systems Security
- Network Security
- Cyber Crime
Sample Classes
-
CYBR 4220: Server Systems Security
This course offers the detailed technical knowledge and skills necessary to protect computer server information system by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from a cybersecurity perspective. Additional learning regarding ongoing maintenance and operational issues of server computing systems will also be included.
-
CYBR 4305: Technology and Cyber Crime
This course provides an overview of cyber crime and computer-related crime issues facing the American criminal justice system, particularly law enforcement. Topic areas include prevalence and types of cyber crime, cyber crime victim and offender characteristics, and methods and types of technologies used to engage in cyber crime. Emphasis is placed on the criminal justice system’s investigation and response to cyber crime. Future trends of cyber crime and computer-related crime are also discussed.
-
CYBR 4333: Network Configuration & Administration
This course continues the study of networks. Topics include design and implementation of networks including synchronization, scheduling, exception and deadlock resolution, client server and web based collaborative systems. Network security will also be covered. Cost estimates and speed are examined from a management perspective.
-
CYBR 4843: Ethical Hacking for Effective Defense
This course explores the identification and validation of network and system vulnerabilities by taking an adversarial approach to network, system, and data access. Topics include network attacks and defenses, Operating System and application vulnerabilities, social engineering attacks, and malware. Ethical, legal implications of network attacks are also discussed.