UG Course Descriptions
This course will introduce the anatomy and physiology of speech, hearing, and swallowing mechanism. Prerequisite: BIOL 207 or BIOL 209/210
This course is an introduction to language development from birth to adulthood. Students will examine the acquisition and development of communication and speech in relation to cognitive, physical, social, and cultural and environmental factors.
This course provides an overview of the acoustics related to speech production and perception, as well as the physiological processes of speech and hearing. Prerequisites: COMD 100 and COMD 102. 15 hours of observation.
This course will serve as an introduction to audiology with an overview of the anatomy, physiology, and pathologies of the auditory system. Students will understand the ethical and professional techniques for hearing assessment and the impact of hearing loss. Prerequisites: COMD 100 AND COMD 102
Cybersecurity Fundamentals introduces learners to the interdisciplinary field of cybersecurity. During the course, learners will review the evolution of information security into cybersecurity, and explores the relationship of cybersecurity to organizations and society. Learners will analyze topics such as vulnerability assessment, ethical hacking, malicious software (malware), virus attacks, spyware, network defense, passwords, firewalls, and intrusion detection. Current issues such as privacy concerns and cyberbullying are also discussed. (prerequisites; CIS 105, CIS 218, CIS 224 and MATH 216 all with grade of C+ or higher)
Defense in depth is the coordinated use of multiple security countermeasures to protect an information technology (IT) enterprise. Students will study the concept of creating multiple layers of security controls as a defense throughout an IT environment to provide redundancy in the event security controls fail or vulnerabilities are exploited. The course will cover aspects of personnel, procedural, technical and physical security controls.
Cybersecurity professionals must be knowledgeable of the possible dangers to their systems. This course will review the common threats to computer networks and provide students with a basic understanding of how systems are attacked. Further, students will be introduced to industry standard and leading methodologies for vulnerability assessment as well as ethical hacking techniques used to simulate real-world attacks in order to assess security and demonstrate business risk. With this understanding of threats and attack techniques. Along with methodologies for technical security assessments, students will be positioned to evaluate network, system, and application security controls, identify and demonstrate security risks, and prioritize vulnerability remediation.
IT Security Governance is the process of establishing and maintaining a framework and supporting management structure and processes to provide assurance that IT security strategies are aligned with and support business objectives, are consistent with applicable laws and regulations through adherence to policies and internal controls, and provide assignment of responsibility, all in an effort to manage risk. The course will introduce students to the key components of IT security governance and review governance frameworks and approaches utilized by large enterprise organizations. Students will gain an understanding of the goals and structure of a security governance program and the key performance indicators used to measure program success.
The course provides students with a background in Offensive Cybersecurity Operations and Open-Source Intelligence Collection. Students will use the latest tools, techniques, and procedures (TTPs) to succeed in exploiting vulnerabilities and evading modern antivirus systems. Students will identify an entity’s public presence from an attacker’s perspective including who within the organization would be a compelling target for an advanced persistent threat.
Prior to attacking a particular system or organization, hackers will gather intelligence on potential targets to understand its strengths and weaknesses. This course will instruct students how to utilize open-source intelligence (OSINT) methods on the deep and dark web, and techniques to improve the way they collect, collate and analyze open source information to generate intelligence. Students will learn how to develop target assessments which list potential vulnerabilities and can be utilized for penetration testing. (Prerequisite: CYB 325)
UG Catalog
Enter a term to search course titles and descriptions, or select a department and/or subject.