SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
INFORMATION SYSTEMS AND CYBERSECURITY BACHELOR OF SCIENCE DEGREE 
ITT TECHNICAL INSTITUTE – COURSE DESCRIPTIONS 
EN3220 Wri en 
Analysis 
This course introduces theories and principles of cri cal and crea ve thinking with 
the goal of analysis and produc on of comprehensive wri en documents. Focus is on 
cri cally evalua ng ideas and arguments. 
HU4640 Ethics 
This course introduces fundamentals of, and differences in, the morals and rules of 
conduct among individuals. Focus is on the iden fica on and analysis of a variety of 
theore cal moral constructs and their applica on to individual and personal behavior. 
IS3110 Risk 
Management in 
Informa on 
Technology Security 
This course explores the convergence of computer networking and 
telecommunica ons technologies. Capabili es and limita ons of converged 
networking infrastructure are analyzed through voice, data and video applica ons in 
rela on to performance, management and security challenges. 
IS3120 Network 
Communica ons 
Infrastructure 
This course explores the convergence of computer networking and 
telecommunica ons technologies. Capabili es and limita ons of converged 
networking infrastructure are analyzed through voice, data and video applica ons in 
rela on to performance, management and security challenges. 
IS3220 Informa on 
Technology 
Infrastructure 
Security 
This course examines security challenges encountered on backbone networks in an 
informa on and communica ons infrastructure. Topics include methods of  ghtening 
infrastructure security, a variety of tools for monitoring and managing infrastructure 
security and commonly‐used technologies, such as firewalls and VPNs. 
IS3230 Access 
Security 
This course explores the concept of controlling access to informa on systems and 
applica ons. Topics include access, authen ca on and accoun ng for end‐users and 
system administrators, and security controls for access control including tokens and 
public key infrastructures (PKIs). 
IS3340 Windows 
Security 
This course examines security implementa ons for a variety of Windows pla orms 
and applica ons. Areas of study include analysis of the security architecture of 
Windows systems. Students will iden fy and examine security risks and apply tools 
and methods to address security issues in the Windows environment.  
IS3350 Security 
Issues in Legal 
Context 
This course provides an overview of legal processes involved in implemen ng and 
maintaining informa on systems security. Students will study security viola ons and 
breaches in rela on to per nent laws and regula ons, and will use case studies to 
analyze legal impacts of informa on security issues.  
IS3440 Linux Security 
This course examines threats, vulnerabili es and other security issues in Linux 
opera ng systems and applica ons in the Linux environment. Students will prac ce 
using different methods, tools and techniques to secure Linux opera ng systems and 
applica ons.  
IS3445 Security for 
Web Applica ons 
and Social 
Networking 
In this course, students will analyze security implica ons of informa on exchange on 
the Internet and via Web‐based applica ons. Topics include methods and techniques 
to iden fy and countermeasure risks, threats and vulnerabili es for Web‐based 
applica ons, and to mi gate risks associated with Web applica ons and social 
networking.  
 
 
 
IS4550 Security 
Policies and 
Implementa on 
This course explores security policies that protect and maintain an organiza on’s 
network and informa on systems assets. Topics include the effects of organiza onal 
culture, behavior and communica ons styles on genera ng, enforcing and 
maintaining security policies.  
IS4560 Hacking and 
Countermeasures 
This course explores hacking techniques and countermeasures. Topics include 
network systems penetra on tools and techniques for iden fying vulnerabili es and 
security holes in opera ng systems and so ware applica ons. Students will prac ce 
ethical hacking procedures to a empt unauthorized access to target systems and 
data, and incident handling procedures in the case of an informa on security 
compromise. Prerequisite: NT2580 Introduc on to Informa on Security or 
equivalent 
IS4670 Cybercrime 
Forensics 
This course explores cybercrime, security threats and legal considera ons facing 
cybersecurity professionals in dealing with the discovery, inves ga on and 
prosecu on of cybercrimes. Students will study tools used by computer forensic 
professionals for inves ga ng cybercrimes, and the use of these tools for the 
collec on, examina on and preserva on of evidence for prosecu on.  
IS4680 Security 
Audi ng for 
Compliance 
This course examines principles, approaches and methodology used in audi ng 
informa on systems security to ensure processes and procedures are in compliance 
with per nent laws and regulatory provisions.  
IS4799 Informa on 
Systems and 
Cybersecurity 
Capstone Project 
This course serves as a comprehensive assessment of knowledge and skills in 
informa on systems and cybersecurity. Ac vi es include research into selected 
security problems and planning, designing and implemen ng security solu ons for a 
user organiza on.  
MA3110 Sta s cs 
This course introduces descrip ve and inferen al sta s cs. Topics include probability 
and probability distribu ons, confidence intervals, hypothesis tes ng and linear 
regression.  
PY3150 Psychology 
This course introduces psychological theories from behavioral, humanis c and 
biological viewpoints. Students apply the skills of cri cal thinking, observa on, 
informa on gathering and analysis to prac ce social science and scien fic 
methodology.  
SC4730 
Environmental 
Science 
This course explores the issues of environmental science using an integra ve 
approach against a poli cal, geographic, cultural and economic backdrop. Through 
hands‐on and virtual labs and applied problem sets, students will study the impact 
humans have on the environment and the costs and benefits of mi ga ng the 
impact. This course includes a laboratory component.  
SP3450 Social 
Psychology 
This course is a survey of theories and research concerned with how individuals 
behave in social constructs, and how they influence and are influenced by other 
people.  
SS3150 Research 
Methods 
This course introduces a step‐by‐step approach to conduc ng research. Topics include 
scien fic reasoning, applying cri cal thinking principles to assess validity and 
reliability in research, and produc on of research‐based documents. 
 

Más contenido relacionado

La actualidad más candente

2012 2013 ieee java projects richbraintechnologies
2012 2013 ieee java projects richbraintechnologies2012 2013 ieee java projects richbraintechnologies
2012 2013 ieee java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
 

La actualidad más candente (6)

2012 2013 ieee java projects richbraintechnologies
2012 2013 ieee java projects richbraintechnologies2012 2013 ieee java projects richbraintechnologies
2012 2013 ieee java projects richbraintechnologies
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Josep Domingo Jordi Castella
Josep Domingo   Jordi CastellaJosep Domingo   Jordi Castella
Josep Domingo Jordi Castella
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 

Destacado

Cnc aluminum parts
Cnc aluminum partsCnc aluminum parts
Cnc aluminum parts宏新 李
 
Cl2 scrubber
Cl2 scrubberCl2 scrubber
Cl2 scrubberwesme1234
 
Волков Виталий
Волков ВиталийВолков Виталий
Волков ВиталийLadytank
 
Kreativ CASO OFF
Kreativ CASO OFFKreativ CASO OFF
Kreativ CASO OFFwilliamvasq
 
Introducao a engenharia_textil_universid
Introducao a engenharia_textil_universidIntroducao a engenharia_textil_universid
Introducao a engenharia_textil_universidJamile Albano Moreira
 
like-english-final-version-web
like-english-final-version-weblike-english-final-version-web
like-english-final-version-webMi?a Sajovic
 
Basic Grammar - IENSCCSA
Basic Grammar - IENSCCSABasic Grammar - IENSCCSA
Basic Grammar - IENSCCSAIENS-CCSA
 
Unsucking the Startup
Unsucking the StartupUnsucking the Startup
Unsucking the StartupIndiginus
 
200OK Solutions Company Profile
200OK Solutions Company Profile200OK Solutions Company Profile
200OK Solutions Company ProfileAnirudh Iyer
 
Sand Filter
Sand Filter Sand Filter
Sand Filter wesme1234
 
March 2016 SCADC Alabama Benefit Checklist
March 2016 SCADC Alabama Benefit ChecklistMarch 2016 SCADC Alabama Benefit Checklist
March 2016 SCADC Alabama Benefit ChecklistJanice [Jan] Neal
 
Ntpc project ( mba)
Ntpc project ( mba)Ntpc project ( mba)
Ntpc project ( mba)viggy vanshi
 
What have you learned from your audience feedback?
What have you learned from your audience feedback?What have you learned from your audience feedback?
What have you learned from your audience feedback?Georgia Jones
 
Sistemas y Tecnologias de la Informacion
Sistemas y Tecnologias de la InformacionSistemas y Tecnologias de la Informacion
Sistemas y Tecnologias de la InformacionConsultor Independiente
 

Destacado (20)

Cnc aluminum parts
Cnc aluminum partsCnc aluminum parts
Cnc aluminum parts
 
Curriculumm
CurriculummCurriculumm
Curriculumm
 
Cl2 scrubber
Cl2 scrubberCl2 scrubber
Cl2 scrubber
 
Extreme Angles
Extreme AnglesExtreme Angles
Extreme Angles
 
Analisis 1
Analisis 1Analisis 1
Analisis 1
 
Волков Виталий
Волков ВиталийВолков Виталий
Волков Виталий
 
Kreativ CASO OFF
Kreativ CASO OFFKreativ CASO OFF
Kreativ CASO OFF
 
Introducao a engenharia_textil_universid
Introducao a engenharia_textil_universidIntroducao a engenharia_textil_universid
Introducao a engenharia_textil_universid
 
Weekly updates 2
Weekly updates 2Weekly updates 2
Weekly updates 2
 
like-english-final-version-web
like-english-final-version-weblike-english-final-version-web
like-english-final-version-web
 
Basic Grammar - IENSCCSA
Basic Grammar - IENSCCSABasic Grammar - IENSCCSA
Basic Grammar - IENSCCSA
 
Unsucking the Startup
Unsucking the StartupUnsucking the Startup
Unsucking the Startup
 
ele forbes article
ele forbes articleele forbes article
ele forbes article
 
200OK Solutions Company Profile
200OK Solutions Company Profile200OK Solutions Company Profile
200OK Solutions Company Profile
 
Sand Filter
Sand Filter Sand Filter
Sand Filter
 
March 2016 SCADC Alabama Benefit Checklist
March 2016 SCADC Alabama Benefit ChecklistMarch 2016 SCADC Alabama Benefit Checklist
March 2016 SCADC Alabama Benefit Checklist
 
Ntpc project ( mba)
Ntpc project ( mba)Ntpc project ( mba)
Ntpc project ( mba)
 
What have you learned from your audience feedback?
What have you learned from your audience feedback?What have you learned from your audience feedback?
What have you learned from your audience feedback?
 
Analysis of rxbot
Analysis of rxbotAnalysis of rxbot
Analysis of rxbot
 
Sistemas y Tecnologias de la Informacion
Sistemas y Tecnologias de la InformacionSistemas y Tecnologias de la Informacion
Sistemas y Tecnologias de la Informacion
 

Similar a ITTCourseDesc

Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesRichard Dioteles
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Course overview
Course overviewCourse overview
Course overviewViettel
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...BRNSSPublicationHubI
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Christo Ananth
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 

Similar a ITTCourseDesc (20)

Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Course overview
Course overviewCourse overview
Course overview
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 

ITTCourseDesc

  • 1. INFORMATION SYSTEMS AND CYBERSECURITY BACHELOR OF SCIENCE DEGREE  ITT TECHNICAL INSTITUTE – COURSE DESCRIPTIONS  EN3220 Wri en  Analysis  This course introduces theories and principles of cri cal and crea ve thinking with  the goal of analysis and produc on of comprehensive wri en documents. Focus is on  cri cally evalua ng ideas and arguments.  HU4640 Ethics  This course introduces fundamentals of, and differences in, the morals and rules of  conduct among individuals. Focus is on the iden fica on and analysis of a variety of  theore cal moral constructs and their applica on to individual and personal behavior.  IS3110 Risk  Management in  Informa on  Technology Security  This course explores the convergence of computer networking and  telecommunica ons technologies. Capabili es and limita ons of converged  networking infrastructure are analyzed through voice, data and video applica ons in  rela on to performance, management and security challenges.  IS3120 Network  Communica ons  Infrastructure  This course explores the convergence of computer networking and  telecommunica ons technologies. Capabili es and limita ons of converged  networking infrastructure are analyzed through voice, data and video applica ons in  rela on to performance, management and security challenges.  IS3220 Informa on  Technology  Infrastructure  Security  This course examines security challenges encountered on backbone networks in an  informa on and communica ons infrastructure. Topics include methods of  ghtening  infrastructure security, a variety of tools for monitoring and managing infrastructure  security and commonly‐used technologies, such as firewalls and VPNs.  IS3230 Access  Security  This course explores the concept of controlling access to informa on systems and  applica ons. Topics include access, authen ca on and accoun ng for end‐users and  system administrators, and security controls for access control including tokens and  public key infrastructures (PKIs).  IS3340 Windows  Security  This course examines security implementa ons for a variety of Windows pla orms  and applica ons. Areas of study include analysis of the security architecture of  Windows systems. Students will iden fy and examine security risks and apply tools  and methods to address security issues in the Windows environment.   IS3350 Security  Issues in Legal  Context  This course provides an overview of legal processes involved in implemen ng and  maintaining informa on systems security. Students will study security viola ons and  breaches in rela on to per nent laws and regula ons, and will use case studies to  analyze legal impacts of informa on security issues.   IS3440 Linux Security  This course examines threats, vulnerabili es and other security issues in Linux  opera ng systems and applica ons in the Linux environment. Students will prac ce  using different methods, tools and techniques to secure Linux opera ng systems and  applica ons.   IS3445 Security for  Web Applica ons  and Social  Networking  In this course, students will analyze security implica ons of informa on exchange on  the Internet and via Web‐based applica ons. Topics include methods and techniques  to iden fy and countermeasure risks, threats and vulnerabili es for Web‐based  applica ons, and to mi gate risks associated with Web applica ons and social  networking.  
  • 2.       IS4550 Security  Policies and  Implementa on  This course explores security policies that protect and maintain an organiza on’s  network and informa on systems assets. Topics include the effects of organiza onal  culture, behavior and communica ons styles on genera ng, enforcing and  maintaining security policies.   IS4560 Hacking and  Countermeasures  This course explores hacking techniques and countermeasures. Topics include  network systems penetra on tools and techniques for iden fying vulnerabili es and  security holes in opera ng systems and so ware applica ons. Students will prac ce  ethical hacking procedures to a empt unauthorized access to target systems and  data, and incident handling procedures in the case of an informa on security  compromise. Prerequisite: NT2580 Introduc on to Informa on Security or  equivalent  IS4670 Cybercrime  Forensics  This course explores cybercrime, security threats and legal considera ons facing  cybersecurity professionals in dealing with the discovery, inves ga on and  prosecu on of cybercrimes. Students will study tools used by computer forensic  professionals for inves ga ng cybercrimes, and the use of these tools for the  collec on, examina on and preserva on of evidence for prosecu on.   IS4680 Security  Audi ng for  Compliance  This course examines principles, approaches and methodology used in audi ng  informa on systems security to ensure processes and procedures are in compliance  with per nent laws and regulatory provisions.   IS4799 Informa on  Systems and  Cybersecurity  Capstone Project  This course serves as a comprehensive assessment of knowledge and skills in  informa on systems and cybersecurity. Ac vi es include research into selected  security problems and planning, designing and implemen ng security solu ons for a  user organiza on.   MA3110 Sta s cs  This course introduces descrip ve and inferen al sta s cs. Topics include probability  and probability distribu ons, confidence intervals, hypothesis tes ng and linear  regression.   PY3150 Psychology  This course introduces psychological theories from behavioral, humanis c and  biological viewpoints. Students apply the skills of cri cal thinking, observa on,  informa on gathering and analysis to prac ce social science and scien fic  methodology.   SC4730  Environmental  Science  This course explores the issues of environmental science using an integra ve  approach against a poli cal, geographic, cultural and economic backdrop. Through  hands‐on and virtual labs and applied problem sets, students will study the impact  humans have on the environment and the costs and benefits of mi ga ng the  impact. This course includes a laboratory component.   SP3450 Social  Psychology  This course is a survey of theories and research concerned with how individuals  behave in social constructs, and how they influence and are influenced by other  people.   SS3150 Research  Methods  This course introduces a step‐by‐step approach to conduc ng research. Topics include  scien fic reasoning, applying cri cal thinking principles to assess validity and  reliability in research, and produc on of research‐based documents.