Cyber Security Courses

Cyber Security Courses

Cyber Security Courses

The following courses are required for completion of the Master of Science in Cybersecurity.

The course introduces logic while giving students the opportunity to make arguments. The course will cover persuasion by defining and explaining what rhetoric is. The course also addresses the practice of social influence; marketing politics, interpersonal relationships, and groups. The course will teach students how to communicate effectively in business situations.

  • Gupta Core Course. Required for All Graduate Business Programs.

An intensive exploration of the intellectual and moral virtues in the context of cultivating
leadership characterized by magnanimity and humility and built on the cardinal virtues (i.e.,
prudence, justice, self-control, and courage). Students develop an advanced capacity for self-
awareness and managing oneself. Connections between ethical, authentic, servant, and
transformational leadership styles and virtues are examined and applied to personal leadership style and ethical decision making.

  • Gupta Core Course. Required for All Graduate Business Programs.

An examination of business as a creation of man and collective contributor to society according to its responsibilities articulated by the tenets of Catholic social teaching including the common
good, solidarity, subsidiarity, the dignity of the human person, worker, and work, and a preference for the poor. Emphasis is placed on how managers and their organizations effect change for a more sustainable planet and just society.

  • Gupta Core Course. Required for All Graduate Business Programs.

teaches students the art of problem-solving using software programming. The
course uses Python as its primary programming language. No prior programming experience is
required. Topics include translating a problem from its real-world context to software, while
addressing the requirements of modeling, abstraction, complexity, and security. The course
will also cover software engineering principles and the use of AI tools, as well as programming for data-intensive applications. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).

  • MS Cyber students may choose between Programming I and AI for Business.

This course covers the legal, ethical, strategic, and practical considerations of utilizing AI in a business context. Students can expect to gain a comprehensive understanding of how AI impacts various facets of business decision-making and operations, equipping them with the knowledge and skills necessary to navigate the evolving landscape of AI technology in the business world.

  • MS Cyber students may choose between Programming I and AI for Business.

This course is designed to provide students with a broad overview of cybersecurity, starting with the concepts of confidentiality, integrity, and availability. Students will be introduced to problems in real-world security centered around specifications, implementation, performance, and human factors. Topics covered in this course focus on real-world security of systems, networks, and data by using material from the evolving threat landscape, cryptography and access control, security protocols and the role of human-computer interaction in cybersecurity. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).

This course provides a comprehensive exploration of cryptography, cryptanalysis, and advanced data protection techniques. Core topics include encryption, decryption, key management, data
anonymization methods, and emerging technologies such as AI-driven security and
quantum-safe cryptography. Through hands-on labs and practical exercises, students will apply
concepts and develop strategies to addresses real-world scenarios. This course is included in the
University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).

Prerequisite:

  • CYBS 6345. Securing the Digital World.

This course examines the governance, risk, privacy and compliance frameworks within which
organizations operate. Students will develop an understanding of the complexities of governance,
risk and compliance starting with a general foundation of laws, standards and risks that apply
across most organizations. The course also examines how security, compliance, and privacy obligations can be used to establish an organization’s risk management program. The focus of privacy within this course will be important to privacy professionals with an interest in gaining privacy certifications including the Certified Information Privacy Professional (CIPP) and others. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).

Prerequisite:

  • CYBS 6345. Securing the Digital World

Corequisite:

  • CYBS 6350. Cryptology and Data Protection.

The Identity and Access Management (IAM) Strategies course will focus on developing students’ knowledge, skills and competencies by examining IAM principles, the NIST cybersecurity framework, and numerous controls/technologies. By studying cyber breach cases and vulnerabilities students will design IAM policies, controls and strategies to protect organizational assets. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).

Prerequisite:
  • CYBS 6345. Securing the Digital World.

This course delves into the foundational and advanced concepts of network security architectures, cloud computing, devices, and protocols with a focus on Zero Trust Network Architecture (ZTNA). Through hands-on labs and presentations, participants will address real-world scenarios, gaining the skills needed to design and implement secure, scalable, and resilient network architectures preparing them for the Certified Network Defender (C|ND) certification. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).

Prerequisites:

  • CYBS 6345. Securing the Digital World.
  • CYBS 6350. Cryptology and Data Protection.

This advanced course provides an in-depth understanding of penetration (pen) testing and vulnerability analysis by cultivating the mindset of an ethical penetration tester. This lab-based course will prepare students for the Certified Ethical Hacker Certification (C|EH). Topics covered
include reconnaissance, identification and exploitation of vulnerabilities, post-exploitation  exercises, and development of mitigation strategies. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).

Prerequisites:

  • CYBS 6345. Securing the Digital World.
  • CYBS 6350. Cryptology and Data Protection.
  • CYBS 7350. Identity and Access Management Controls and Strategies.
  • CYBS 7357. Network Security Architecture.

This course is taken in the last semester and is designed to integrate all earlier coursework. This
course examines Cybersecurity at a program level by developing strategy that includes components including mission, values, organizational structure, network structure, policy, risk assessment, vulnerability management, metrics, business continuity, disaster recovery, awareness, education, culture, staffing, and threat analysis. Students will develop four major projects and present the final project to a cybersecurity professional for review, recommendation and  evaluation. This course is only open to MS students in Cybersecurity. Approval is required to enroll. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).

Prerequisites:

  • CYBS 6345. Securing the Digital World.
  • CYBS 6350. Cryptology and Data Protection.
  • CYBS 7350. Identity and Access Management Controls and Strategies.
  • CYBS 7357. Network Security Architecture.