Cybersecurity

  • CYBR

    What is Cybersecurity?

    The purpose of the Bachelor of Science with a major in Cybersecurity (BS-CYBR) program is to create technologically capable, business-aware cybersecurity professionals capable of applying technical skills and the knowledge of security management to protect computerized information systems from a wide variety of threats, and to manage the risks associated with modern information technology usage. Cybersecurity is a computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of information technology, law, policy, human factors, ethics, and risk management often in the context of adversaries.

    Coles College of Business

    Learn more about Cybersecurity

    Admission Requirements


    None

    This program does not have specific admission requirements. Only admission to Kennesaw State University is required to declare this major.

    General Education Core Curriculum Requirements Specific to This Major


    Area A2: Students must take MATH 1113 or higher.

    Area D1: Students must take MATH 1179 or higher.

    Area D2:  Select two course pairs from the following (8 Credit Hours): CHEM 1211/L, CHEM 1212/L, PHYS 1111/L*, PHYS 1112/L, PHYS 2211/L*, PHYS 2212/L, BIOL 1107/L, or BIOL 1108/L. *Students cannot take both PHYS 1111/L and PHYS 2211/L nor PHYS 1112/L and PHYS 2212/L.

    Related Minors or Certificates Available


     

    Sample Classes


    • This course offers the detailed technical knowledge and skills necessary to protect computer server information system by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from a cybersecurity perspective. Additional learning regarding ongoing maintenance and operational issues of server computing systems will also be included.

    • This course provides an overview of cyber crime and computer-related crime issues facing the American criminal justice system, particularly law enforcement. Topic areas include prevalence and types of cyber crime, cyber crime victim and offender characteristics, and methods and types of technologies used to engage in cyber crime. Emphasis is placed on the criminal justice system’s investigation and response to cyber crime. Future trends of cyber crime and computer-related crime are also discussed.

    • This course continues the study of networks. Topics include design and implementation of networks including synchronization, scheduling, exception and deadlock resolution, client server and web based collaborative systems. Network security will also be covered. Cost estimates and speed are examined from a management perspective.

    • This course explores the identification and validation of network and system vulnerabilities by taking an adversarial approach to network, system, and data access. Topics include network attacks and defenses, Operating System and application vulnerabilities, social engineering attacks, and malware. Ethical, legal implications of network attacks are also discussed.

     

    ©