26.12.2016 Views

2016–2017 2016–2017

2016-2017-graduate-catalog

2016-2017-graduate-catalog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CYBERSECURITY PROGRAMS<br />

MASTER OF SCIENCE IN CYBERSECURITY<br />

TECHNOLOGY<br />

Develop the next generation of advanced cyber threat prevention<br />

skills at a university nationally recognized for excellence in<br />

cybersecurity.<br />

The innovative graduate cybersecurity technology program<br />

draws from fields such as information technology, forensics,<br />

management, law, science, business, and psychology to provide<br />

you with the most current knowledge and skills for protecting<br />

critical cyber infrastructure and assets.<br />

What You’ll Learn<br />

Through your coursework, you will learn how to<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Prevent network attacks through business impact and vulnerability<br />

assessments<br />

Detect and mitigate cyber attacks through tools, techniques,<br />

and penetration testing<br />

Develop a business continuity plan in the event of an attack<br />

Apply digital protection techniques across operating systems<br />

and mobile platforms<br />

Manage security architecture and operations<br />

Integrate digital forensics investigative techniques<br />

Identify system vulnerabilities and solve problems with intrusion<br />

detection tactics<br />

Careers<br />

<br />

<br />

<br />

<br />

<br />

<br />

Security management specialists<br />

Information security analysts<br />

Database administrators<br />

Network and computer systems administrators<br />

Computer network architects<br />

Computer network support specialists<br />

The cybersecurity technology curriculum features emerging<br />

topics in the field and builds in many opportunities for you<br />

to interact with employers through recruitment and networking<br />

events. Additionally, a board of industry leaders and<br />

employers advises our faculty to make sure our cybersecurity<br />

programs are covering emerging areas that are relevant to<br />

your career growth.<br />

Coursework Examples<br />

<br />

<br />

Use protocol analyzers, intrusion detection systems, intrusion<br />

prevention systems, network mapping tools, network<br />

scanning tools, encryption/decryption tools, digital forensics<br />

tools, and password exploitation tools<br />

Perform ethical hacking and vulnerability assessments<br />

Industry Certification<br />

This program can help prepare you for the following exams:<br />

<br />

<br />

<br />

Certified Information Systems Security Professional (CISSP)<br />

Global Information Assurance Certification (GIAC)<br />

Certified Ethical Hacker (CEH)<br />

Technology Requirements<br />

The cybersecurity technology program requires that you use a<br />

computer with the following:<br />

<br />

<br />

<br />

<br />

Microphone and speakers or headset with microphone or<br />

equivalent device(s)<br />

5 GB (gigabytes) of free hard drive space<br />

2 GB RAM or higher<br />

A high-speed Internet connection<br />

<br />

Computer processor (Intel Pentium 4 or AMD Athlon 64)<br />

running at speeds of at least 1GHz<br />

<br />

Windows 7 or Mac OS X 10.6 or higher for an operating system<br />

(Linux operating systems can also be used but require<br />

more technical knowledge from the user.)<br />

Your Coursework<br />

Note: The higher the processor speed of your computer (e.g.,<br />

2.4G–3.4 GHz), the larger the amount of available memory<br />

(e.g., 4–12 GB), and the larger the amount of available hard<br />

drive space (e.g., 5–20 GB), the better your computer will perform<br />

and the smoother your experience will be.<br />

Course descriptions are found on pp. 92–128. Before enrolling, check www.umuc.edu/catalogs for possible updates to program offerings.<br />

More information about certificates, including gainful employment disclosures, is available at <br />

34<br />

GRADUATE CATALOG | <strong>2016–2017</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!