MISY 667, Cybersecurity Management (Graduate level)
This course is a broad introduction to managerial issues of cybersecurity. The topics of the class range widely, including technical (e.g., cryptography), managerial (e.g., defense methods for organizations), physical (e.g., door locks), and psychological (e.g., social engineering) issues. A key objective of the class is to develop a security mindset, in which one learns to think like an attacker for ways to exploit a system.
MISY 810, Telecommunications & Networking (Graduate level)
This course introduces students to the technical and managerial aspects of both local and wide-area business networks, with an emphasis on secure data communications. Areas of instruction include fundamental data transmission concepts, as well as local and wide-area network hardware and systems software, The connection among networking technologies and business implications is emphasized. Students put into practice many of the concepts learned throughout the semester through a series of hands-on exercises using networking hardware and software tools.
MISY 850, Security & Control (Graduate level)
This course is a survey of topics in the realm of information security. It considers many contemporary topics ranging from basic security threats to cyber-warfare to security ethics to legal and cultural differences between countries. The course emphasizes managerial decision making through analyzing security problems and understanding effective solutions. The course culminates in a research project in which students conduct a real-world information technology risk assessment using an organization of their choice.
MISY 305, Information Security & Risk Management (Undergraduate level)
This course is a survey of topics in the realm of information security. It considers many contemporary topics ranging from basic security threats to cyber-warfare to security ethics to legal and cultural differences between countries. Emphasis is placed on human and technological aspects of information security and issues relevant to the risks in which information systems are exposed and methods of dealing with such risks.