Houston Christian University Catalog

Cybersecurity (CYSC) Course Descriptions

  • CYSC 1331 Introduction to Cybersecurity

    Prerequisite(s): MATH 1434

    This course will cover the basic concepts needed to identify and protect yourself against common cyber threats and attacks; how computers and networks are attacked, how attackers benefit and how to mitigate attacks.

  • CYSC 2311 System Administration

    Prerequisite(s): CYSC 1331 and COSC 1352

    An introduction to system administration examining the Windows operating system running on physical hardware, as well as Type-1 hypervisors and hosted virtual machines. Topics will include installation, configuration, server and system administration, logging and auditing, backup and restoration, file management, and account management.

  • CYSC 2312 Cloud Architecture

    Prerequisite(s): CYSC 1331

    This course will introduce concepts, terminology, technologies, benefits, and challenges of cloud computing technology covering topics such as SaaS, IaaS, PaaS delivery models, and common cloud deployment models (Public, Private, Hyper). Students will also learn cloud characteristics, such as a focus on complex cloud-based solution design, including the incorporation of hybrid cloud deployment models, compound design patterns, and solution architectures that span cloud and on-premise environments.

  • CYSC 2321 Mobile/Wireless Computing

    This course will introduce students to a variety of wireless networks including low-power, machine-to-machine communication as in the Internet of Things, ad-hoc wireless networks, to wireless network connections based on WiFi signals, and to cellular networks as in 5G technologies. While we introduce the physical layer and have a goal of getting data to the Internet at large, the focus of this course is on the wireless protocols themselves.

  • CYSC 4321 Information Assurance

    This course provides an overarching model for information assurance for businesses, government agencies, and other enterprises needing to establish a comprehensive security plan. Students will be guided through the components of security and the construction of an effective security policy. Topics include asset identification, human factors, compliance with regulations, personnel security, risk assessment, business continuity, and ethical considerations, as well as computer and network security tools and methods.

  • CYSC 5301 Applied Cryptography and Cybersecurity

    Practical issues in cryptography, including examples of classical cryptosystems; modern cryptosystems, cryptanalytic techniques, and how they operate; hands-on experience with current cryptographic technologies. Topics include, but not necessarily limited to, CIA triad, symmetric block and stream ciphers, asymmetric crypto techniques, homomorphic cryptography, threshold cryptography, data integrity algorithms such as cryptographic hash functions, message authentication codes (MAC), digital signatures, cryptographic protocols, cryptanalysis, key management and distribution, etc.

  • CYSC 5302 Operations Systems Security

    This course examines controls over personnel, hardware, software, and systems as they relate to techniques of access control, authentication, secure communication and audit. Accepted best practices and guidelines to secure information systems and networks. Security policies, system configuration, integration, and maintenance.

  • CYSC 5303 Cybersecurity Risk Analysis

    This course focuses on the organizational issues of risk analysis in the organizational policies and the legal context the networked systems. Organizational problems involving reliability, safety, security, and privacy as pertains to a human’s well-being.

  • CYSC 5304 Secure Cloud Computing

    The course will provide a survey of cloud services and how they can be used to construct scalable, secure cloud applications. Security concerns and best practices for cloud computing and cloud services; cloud computing architectures, risk issues and legal topics; data security; internal and external clouds; information security frameworks and operations guidelines are among the topics covered in this course.

  • CYSC 5305 Information Systems Assurance

    This course investigates methodologies for identifying an institution’s information technology assets, exploring the risks of these systems and the proper ways to determine the necessary level of protection required. The course explores the different information systems audit procedures, compliance to governmental regulations and techniques for developing budgets for security implementations.

  • CYSC 5310 Graduate Capstone Project

    All students are required to demonstrate the ability to clearly evaluate a particular information security need, identify potential solutions, evaluate the alternatives, and implement the best solution. This capstone project will draw upon portfolio case assignments completed in previous courses to produce a complete solution for the assigned problem.

  • CYSC 5311 Network Security Concepts and Applications

    The course covers principles of computer networks and network security design and operation. Principles of computer networks: requirements, connectivity levels, layered architectures, and applications. Direct link networks, packet switched networks, IP, and internetworking. Core perimeter security fundamentals and network security components. Layered security and defense in depth. Packet filtering, routers as security devices, intrusion detection

  • CYSC 5312 Wireless and IoT Device Security

    This course covers the importance of IoT in society, the current components of typical IoT devices and trends for the future. IoT design considerations, constraints and interfacing between the physical world and your device will also be covered. How to make design trade-offs between hardware and software are also investigated.

  • CYSC 5313 Legal Regulations, Compliance, and Investigation

    The course examines computer crimes, laws, and regulations. It includes techniques for investigating a crime and gathering evidence. It also covers techniques for creating incident reports.

  • CYSC 5314 Ethical Hacking and Penetration Testing: Network and Wireless

    Application of tools, techniques, and procedures to perform penetration testing on networks and applications to identify the different security vulnerabilities.