Keep data secure
Nowadays, the internet has made it possible for anyone to gather information about anything at anytime. So, keeping that data safe is what cyber security is all about. In this cyber security program, you will learn the theories, laws and protocols of cyber security.
You will learn all of this from expert faculty who work with you hands-on. You will also complete a capstone project with a team and serve as consultants to address a major cyber security threat challenging an organization.
What you'll learn in the cyber security program
- Background of cyber security
- Theories, laws and protocols of cyber security
Learning doesn’t get more innovative than this.
At Lynn University, we embrace technology by encouraging our students to engage with course content through iPads, and our professors can develop custom course materials.
Cyber security curriculum
Experiential learning is at the heart of this program. You will gain a solid background in informations systems and cyber security and put all that you've learned into practice. You will also complete a capstone project in which you form a small project team with classmates and serve as consultants to address a major cyber security threat challenging an organization.
ISM 310 Critical Security Controls
This course uses a project-based approach to introduce students to the Critical Security Controls (CSCs) documented by the Council on Cyber Security. The CSCs prioritize the steps necessary to identify and mitigate security threats and are rapidly becoming the industry standard in cyber security. This course will teach students to implement and audit the Critical Security Controls. Topics covered include integrated vulnerability management solutions, risk assessment, real-time network monitoring, security postures and threat detection.
ISM 410 Network and Wireless Security
This course will use a project-based approach to examine both network device security and wireless security issues. For wireless security, specific attention will be paid on Wi-Fi and Bluetooth technologies, wireless standards, authentication issues and configuration models.
ISM 412 Digital Forensics and Auditing
This course will focus on digital forensic practices, tools and exercises for the collection of electronic evidence on network, client and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases. Additionally, this course explores malware analysis tools and techniques that target and infect Windows systems. Knowing the capabilities of malware is critical to an organization’s ability to derive threat intelligence, respond to information security incidents and establish defenses.
Cyber security jobs
Cyber security jobs continue to grow as the need for data protection increases. Cyber security professionals are needed across a wide spectrum of fields including health care, business, education, government, non-profit and banking. That means you can customize your learning experience by choosing the field that is right for you. Many of our alumni have gone on to work for companies to support IT services, including:
- CMIT Solutions
- e5 Pharma
- Modernizing Medicine
- Office Depot
- Thales e-Security