BSIT in Cyber Security

Course Code Course Name Credit
CIS225 Network Management 4.5
CIS374 Security Mechanisms (Countermeasures) 4.5
CIS376 Software Security, Practices, Policies, and Standards 4.5
CIS411 Threat Analysis Model 4.5
CIS412 Vulnerabilities 4.5
CIS420 Intrusion Detection 4.5
CIS247 Information Assurance and Cyber Security Architecture 4.5
CIS215 Legal and Ethical Issues in Cyber Security 4.5

CIS225  Network Management  

In this course, students further develop the knowledge and skills in the network management and administration. The conceptual and practical framework for both wired and wireless network configuration and management is compared and contrasted through a series of hands-on exercises and projects. In order to manage networks efficiently, students learn scripting in different operating systems. The expected learning outcomes include designing LAN/WAN, troubleshooting of a variety of networking problems, and demonstration of effective management skills while operating an enterprise switch through a management console. In addition, the course introduces the performance evaluation procedures. Prerequisite: CIS146.

CIS374  Security Mechanisms (Countermeasures)

The course is designed to provide an overview of the modern aspects of cryptography, authentication, redundancy, and intrusion detection. The learning outcomes include an installation and configuration of a PKI-based application. Upon completion of the course, the students are able to give the characteristics of an effective password, explain the differences between symmetric and asymmetric cryptosystems, as well as the differences in efficiency and performance between software-based and hardware-based cryptosystems. Prerequisite: CIS201.

CIS376  Software Security, Practices, Policies, and Standards

This course gives the students the insides of the best security coding practices as well understanding of the role the policies and standards play in modern information security. The topics include an introduction to the goals of secure coding, an overview and comparison of evidence-based security and code access security, authentication methods to system resources and services, and data encryption between systems and services. After completion of the coursework, the participants are able to develop and test a simple application that uses systems services to encrypt a data stream, send it to a different system and decrypt the data stream. Also the class team works on performing a security audit of the code of an existing system, identifying problems that violate best security coding practices and making recommendations to fix each problem. In addition, the participants are able to develop a set of policies that implement a specified organizational objective and satisfy the current standards for industry, and justify why each policy is necessary to meet a specific objective.Prerequisite: CIS201.

CIS411  Threat Analysis Model 

This course covers the security threat around the attacks and mitigations while analyzing Computer Security by building on the high-profile security failures. Different types of the attacks are studied, compared, and contrasted. The students are familiarized with the most effective countermeasures for blocking or weakening the attacks. As an additional learning outcome, they learn how to perform effective security management and risk analysis. Privacy concerns as well as the aspects of law and ethics are introduced. Prerequisite: CIS201.

CIS412  Vulnerabilities    4.5 credits

The students learn how to detect and respond to vulnerabilities and minimize exposure to costly security breaches, as well as to employ real-world exploits and evaluate their effect on the information systems. In addition, the participants learn how to configure vulnerability scanners to identify weaknesses, analyze the results of vulnerability scans and establish a strategy for vulnerability management. Prerequisite: CIS201.

CIS247  Information Assurance and Cyber Security Architecture 

Students learn the basics of information assurance and cyber security architecture. This course includes fundamental aspects of countermeasures over various security domains, computer forensics, information states, security services, threat analysis, and vulnerabilities. While working on individual or team-based projects, students synthesize and apply practical understanding of the principles of data protection, network security, and computer forensics including their understanding of the ethical, legal, and policy issues associated with information assurance and security. Prerequisite: CIS201.

CIS215  Legal and Ethical Aspects in Cyber Security  

This course offers introduction to cyber crimes and cyber security. Students gain an in-depth understanding of ethical online practices such as intellectual property rights, privacy, anti-piracy, infrastructure protection and the implication of their violation. Cyber crime and warfare form an important component of Cyber Security. Effective development and implementation of cyber laws and policies are at the center of our discourse while technology as a boon or bane is thoroughly discussed. This course aims to ensure privacy, integrity and reliability of information systems as well as spread awareness about their potential for misuse. Prerequisite: None.

Start your journey at KKMII-Stratford University
In collaboration with Stratford University USA

Woodbridge Campus USA
read more »