The minor is intended for students studying computer engineering, computer science, software engineering, or management information systems with the goal of enabling them to work in cyber security. The minor consists of a series of lab based courses that are designed to provide students with both the technical background and the hands-on experiences along with the theoretical background to allow them to compete to jobs in cyber security.
The minor requires 15 credits and at least 9 credits can not be used to meet any other department, college, or university requirement. Below is the list of courses used in the minor.
|Cyber Security Concepts and Tools|
|One of the following:||3-4|
|Operating Systems: Principles and Practice|
|Linux Operating System Essentials|
|Introduction to Operating Systems|
|Basics of Information System Security|
|Cyber Defense Competition Must take 3 times|
|Formal Methods in Software Engineering|
The minor in cyber security is designed to prepare students with the technical skills for entry into cybersecurity positions in industry or government agencies.
A few years after graduation, students completing the cyber security minor should be:
- Contributing to their communities and society in the area of cyber security technology and applications and demonstrate an understanding of contemporary security issues, both technological and societal.
- Advancing in their careers through application of their knowledge of cyber security
- Working effectively as team members and demonstrating ethics and responsible behavior
- Applying cyber security methods and concepts to the general area of their BS degree
- Continuing their professional development through life-long learning
After earning the minor in cyber security students will
- demonstrate the ability to apply knowledge of cyber security concepts, tools and technologies to computer systems.
- understand cyber security risks, threats and countermeasures and apply this understanding to develop cyber defense strategies.
- demonstrate the ability to design cyber security systems to meet organizational needs within realistic constraints such as economic, environmental, social, and ethical expectations.
- demonstrate the ability to function on teams.