cyber background

Information Systems & Cybersecurity

Explore a curated, job‑aligned pathway across Information Systems and Cybersecurity.

Information Systems

Information Systems & Enterprise Technology

Digital transformation, data platforms, AI for business, consulting practice.

  • Digital Transformation of Business
  • Managing Complex Projects
  • IT and Global Sourcing Strategy
  • IT Consulting Lab Practicum
  • Developing Internet Systems and Services
  • Large‑Scale Computing on the Cloud
  • Database Management
  • Advanced Database Management
  • Introduction to Java for Business
  • Cyber Networks: Securing the Digital Frontiers
  • Cybersecurity and Data Vulnerabilities
  • Cybersecurity
  • Responsible AI
  • AI Development and Business Applications
  • Generative AI
  • Human‑AI Fusion
  • Machine Learning: Design and Deployment
  • Data Science and Business Intelligence
Cybersecurity

Cybersecurity — Foundations, Engineering & Leadership

Governance, secure design, privacy, enterprise architectures.

  • Foundations of Information Assurance
  • Information Security and Privacy
  • Security Engineering
  • Cyber Strategy and Leadership
  • Information Assurance Architectures and Technologies
Cryptography

Cryptography, Trust & Identity

Crypto, PKI, authentication, and zero trust.

  • Cryptology
  • Public Key Infrastructure and Managing E‑Security
  • Zero Trust Principles and Practice
  • Authentication Technologies
  • Java Security
Networks

Networks, Systems & Web

Securing networks, operating systems, and modern web stacks.

  • Network Security
  • Operating Systems Security
  • Web Security
  • Advanced Web Security
Industrial Systems

Industrial, Embedded, IoT & Cyber‑Physical Systems

ICS/SCADA, embedded security, UAVs, intelligent vehicles, IoT privacy.

  • Embedded Computer Systems — Vulnerabilities, Intrusions, and Protection Mechanisms
  • Securing Industrial Control Systems
  • Securing Industrial Control Systems (Applied)
  • Cyber Physical Systems Security
  • Introduction to Internet of Things Security and Privacy
  • Intelligent Vehicles: Cybersecurity for Connected and Autonomous Vehicles
Forensics

Forensics, Reverse Engineering & Malware

Dead/live forensics, reverse engineering, malware analysis, runtime defense.

  • Computer Forensics
  • Digital Forensics Technologies and Techniques
  • Mobile Device Forensics
  • Reverse Engineering and Vulnerability Analysis
  • Malware Analysis
  • Engineering Runtime Malware Detection
Threat Hunting

Threat Hunting, Intelligence & Exercises

IDS/IPS, EDR/SIEM/TIP, covert channels, red/blue exercises, analytics.

  • Intrusion Detection
  • Cyber Threat Hunting and Intelligence
  • Covert Channels
  • Cyber Exercise
  • Information Assurance Analysis
AI for Cybersecurity

AI, GenAI & Assured Autonomy

AI for defense, safety, robustness, explainability, human‑machine teaming.

  • AI for Cybersecurity
  • Introduction to Assured AI and Autonomy
  • Assured Autonomy
  • AI for Assured Autonomy
  • Generative AI for Cybersecurity
  • Generative AI and Synthetic Threats
Ethical Hacking

Ethical Hacking

Offense‑informs‑defense: recon to post‑exploitation.

  • Introduction to Ethical Hacking
Independent Study

Capstones & Independent Study

Publishable projects, tools, and focused research.

  • Capstone Project in Cybersecurity
  • Independent Study in Cybersecurity I
  • Independent Study in Cybersecurity II