Keep data secure
The internet has made it possible for anyone to gather information about anything at anytime. So, keeping that data safe is what cybersecurity is all about. In this program, you will learn the theories, laws and protocols of cybersecurity.
You will learn all of this from expert faculty who work with you hands-on. You will also complete a capstone project with a team and serve as consultants to address a major cybersecurity threat challenging an organization.
What you'll learn in the cybersecurity program
- Background of cybersecurity
- Theories, laws and protocols of cybersecurity
Learning doesn’t get more innovative than this.
At Lynn University, we embrace technology by encouraging our students to engage with course content through iPads, and our professors can develop custom course materials.
Experiential learning is at the heart of this program. You will gain a solid background in informations systems and cybersecurity and put all that you've learned into practice. You will also complete a capstone project in which you form a small project team with classmates and serve as consultants to address a major cybersecurity threat challenging an organization.
ISM 310 Critical Security Controls
This course uses a project-based approach to introduce students to the Critical Security Controls (CSCs) documented by the Council on Cyber Security. The CSCs prioritize the steps necessary to identify and mitigate security threats and are rapidly becoming the industry standard in cyber security. This course will teach students to implement and audit the Critical Security Controls. Topics covered include integrated vulnerability management solutions, risk assessment, real-time network monitoring, security postures and threat detection.
ISM 410 Network and Wireless Security
This course will use a project-based approach to examine both network device security and wireless security issues. For wireless security, specific attention will be paid on Wi-Fi and Bluetooth technologies, wireless standards, authentication issues and configuration models.
ISM 412 Digital Forensics and Auditing
This course will focus on digital forensic practices, tools and exercises for the collection of electronic evidence on network, client and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases. Additionally, this course explores malware analysis tools and techniques that target and infect Windows systems. Knowing the capabilities of malware is critical to an organization’s ability to derive threat intelligence, respond to information security incidents and establish defenses.
Cybersecurity jobs continue to grow as the need for data protection increases. Professionals are needed across a wide spectrum of fields including health care, business, education, government, non-profit and banking. That means you can customize your learning experience by choosing the field that is right for you. Many of our alumni have gone on to work for companies to support IT services, including:
- CMIT Solutions
- e5 Pharma
- Modernizing Medicine
- Office Depot
- Thales e-Security