CyberSecurityOperations/Ldrshp (CSOL)


Units: 3 Repeatability: No

This course will provide an overview and fundamental understanding to the concepts essential to the cyber security professional. Students will understand how to categorize and value organizational assets, and how to mitigate risk to these resources. Within this context, students will be introduced to various types of security policies, understand how security controls must follow the policy, and the application of security controls to enforce policy. We will explore how cyber security policy can be enforced in the operating system, in software development, in networks, and through various mechanisms such as cryptography. Student will engage with the concept incident response, and the process of handling a breach including investigation and forensics. Finally, students will learn the roles leaders can play in enhancing, supporting, and promoting cyber security in organizations. It is vitally important for students to have both a conceptual understanding of cyber security and applied practice. Therefore, this course will have a significant hands-on element that will introduce students to a plethora of cyber security tools and allow them to immerse themselves in cyber security operations. We will explore basic cyber security scripting utilizing Python; threat analysis; vulnerability assessment; traffic analysis, encryption; penetration testing; and several other topics.


Units: 0 Repeatability: No

This orientation course introduces you to the University of San Diego and provides important information about the program. Throughout the orientation, you will learn to successfully navigate through the Blackboard learning environment and locate helpful resources. You will practice completing tasks in Blackboard as preparation for success in your online graduate courses. This orientation course will be available to you as a reference tool throughout the entirety of your program.


Units: 3 Repeatability: No

This course will provide in introduction to modern applied cryptographic theory and practice, and how cryptography is used to support information security missions. It will be based upon open literature discussions that are most similar or applicable to advanced multi-level security systems and military grade defenses.


Units: 3 Repeatability: No

This course will introduce the student to the importance of security architecture design in enterprise security. Security architecture frameworks will then be used to explore and develop information system security architectures. Students will be presented with a structured approach to the steps and processes involved in developing security architectures. Also considered will be how major organizational issues likely to be encountered can be resolved.


Units: 3 Repeatability: No

This course is an introduction to risk management as the principles and practices pertain to the cyber domain. Topics include an overview of traditional risk management processes, requirements, objectives and tools. The course also covers the NIST-driven Risk Management Framework (RMF) – the current US national guidance on Cyber Security standards and practices – and will include overviews of DITSCAP/DIACAP as background reference to previous government/defense efforts in Cyber Certification and Accreditation and their influence on current cyber security practices.


Units: 3 Repeatability: No

This course will provide an understanding of the concept of policy in information security. Students will explore the types of policy that are part of an overall security strategy, from policy that determine rules and best practices, to those which drive computer security, including discretionary access control, mandatory access control, and role-based access control types of policies, and how these are used in organizations. Through this course, students will understand the basic elements of policy construction.


Units: 3 Repeatability: No

The course will be taught around a set of established engineering, economic and management processes and practices to fill a gap in planning for improved cyber security within organizations. Students will understand the role of management and leadership in mitigating threat and achieving organizational goals in information protection. The course will provide an overview of audit, compliance, and regulation, and how cyber can affect the legal responsibility and liability for business. It will demonstrate how to construct effective continuity and disaster recovery plans, as well as exploring acquisition and procurement of technology with security in mind. Students will understand economic factors surrounding cyber security, as well as how to build effective teams and lead in contested cyber environments.


Units: 3 Repeatability: No

This course will provide an in-depth study of the principals and tenets of the design and development process of secure software used to provide enhanced cyber security. It will review the traditional models of software development, with the idea that a developer or project manager must strategize for security before starting development. Students will understand how to gather and plan for security requirements in development. The course will explore how vulnerabilities can be mapped and planned for. Students will understand how to run an effective development process, culminating with implementation, and how to review and test software. Finally, the course will introduce the concept of software assurance and its role in the cyber security paradigm.


Units: 3 Repeatability: No

The course will introduce the concept and principles of network security. It will provide a conceptual construct of how to think about securing networks, how to translate this into basic architectural design, and then a survey of some component level considerations. It will then move into deeper investigation of specific topics in network security, including: network visualization, network analysis, perimeter defense strategies, network monitoring, vulnerability detection, and security in mobile and wireless environments. Within this context, students will understand how to apply the various pieces/topics into a cohesive network security strategy.


Units: 3 Repeatability: No

This course will present and discuss how information superiority and information dominance is key to influencing operations associated with establishing and maintaining cyber security. Topics include overview of current and historical intelligence efforts and how those processes in various domains (human, electronic, digital) apply to cyber operations and security. Course specifically includes exploitation of “big data” and multi-format information collections (text, video, structured/unstructured) to support cyber situation awareness. It will feature discussions of modern versus classic data collection methods and Intelligence examples from current events.


Units: 3 Repeatability: No

This course will introduce the principles and general practice of incident response, including an overview to digital and network forensics. It will define what constitutes an incident, what is meant by incident response, the attack lifecycle, and goals of incident response. The course will discuss building an incident response team, the steps in the process, and preparing for incident response. Students will understand the process of detecting and characterizing an incident, collecting and analyzing data, and the process of remediation. The course will then provide a deeper dive into the practice digital forensics, specifically focusing on computer, mobile, network, and database forensics. It will outline the investigative and analysis process, survey tools, digital evidence, and briefly touch on the law.


Units: 1-6 Repeatability: Yes (Repeatable if topic differs)

Prerequisites: CSOL 500 with a minimum grade of C-

Special topics course in areas of special interest to cyber security. May be repeated for credit with a different topic.


Units: 1 Repeatability: No

Prerequisites: CSOL 500 with a minimum grade of C-

CSOL 599 will be given at the end of the MS Cyber Security Operations and Leadership degree to bring the entire body of knowledge in cyber security into greater focus. Students will demonstrate achievement of the program learning outcomes by tying together the major concepts, skills, and examples of ethical leadership that were included in the program curriculum. Students will be asked over the course of the semester to research, collect, and revise course artifacts that comprise the final project. The final project of an ePortfolio will enable students to showcase their body of work and will provide a lasting resource that will allow them to review and rapidly research topics as they progress through their careers.