300
Ethics in Cyberspace is a course that cultivates virtuous leadership in the digital sea. This course investigates the growing need for an ethical sophistication of the technological world. We will specifically examine the ethical use of hardware, software and Internet systems, the ethical use of private information, big data acquisition, data analytics and the evils of the dark web. As these dangerous arenas grow, it is vital to equip the rising generation with the knowledge and tools to defend Christian values in cyberspace.
PHL 212 Foundations of Ethics
Covers the fundamental algorithms used in both private key and public key cryptography. Algorithms covered will include DES, AES, Diffie-Hellman, and RSA. Traditional encryption methods such as Vigenere ciphers and their cryptanalysis will be briefly described. The number theory needed to understand primality testing and RSA encryption will be developed in detail. Several programming projects aimed at implementing some of the material will be given throughout the semester (Cross listed with CSC 330 and MTH 330).
CSC 141, 144, 171, or 280; and MTH 220
This course focuses on the mathematical foundations found at the heart of computer-based machine learning and artificial intelligence techniques. Topics include linear regression, network connectivity and neural networks, input methods including edge detection and filters, genetic algorithms, and Bayesian networks.
Students will learn the fundamental methodology for how to analyze and secure information systems. This course will cover the basic concepts in computer security including operating system and application vulnerability analysis and defense. Students will gain experience securing enterprise systems in both Windows and Linux environments.
SFE 240 Applied Network and Infrastructure Management
Students will learn the fundamental methodology for how to analyze and secure enterprise networks. This course will cover the basic concepts in both wireless and wired network security including network security controls, protocol analysis, and applied cryptography. Students will conduct network vulnerability analysis and defense. This course builds upon topics covered in the Advanced Network Management course.
SFE 240 and SFE 330
This course exposes students to the challenges of insecure and vulnerable software. Students will be exposed to basic programming constructs as well as the specific principles of object-oriented programming languages. The course also surveys the types of threats and vulnerabilities inherent in software. An overview of secure coding concepts and techniques will be provided to students to provide exposure as to how software can be made more secure and resilient through the application of proper software engineering practices. This course builds upon topics covered in the Software Engineering course.
SFE 240 Applied Network and Infrastructure Management
Covers inspections of requirements, design and code, as well as testing, the handling of change requests, software evolution, code comprehension, and change management.