CybersecurityThe minor in cybersecurity is available to students who wish to develop knowledge and skills in computer security principles and applications. This minor consists of 5 classes totaling 15 credits. Four of these five courses are specific computer security courses, and the remaining elective course can be chosen from the SST/CPS/SET courses, Students will learn the cybersecurity concepts along with hands-on experience of security technologies. Students must maintain a cumulative GPA of 2.0 in the minor. All students can participate in this minor except those who are majoring in Security Systems or Computer Security Technology. Student Learning Outcomes:
About Academic MinorsFarmingdale State College students are invited to enhance their studies with an "Academic Minor." A minor is a cluster of thematically related courses drawn from one or more departments. In addition to department based minors (e.g. computer programming & info systems), interdisciplinary minors are also available (e.g. legal studies). Academic minors are approved by the College-Wide Curriculum Committee and the Provost. Students must make application for an academic minor through the department offering the minor in conjunction with the Registrar's Office Specific course work must be determined in consultation with a faculty member in the department offering the minor. A statement of successful completion of the academic minor will appear on the student's transcript at the time of graduation.
Admission to Farmingdale State College - State University of New York is based on the qualifications of the applicant without regard to age, sex, marital or military status, race, color, creed, religion, national origin, disability or sexual orientation. Computer Security | Dr. M. Nazrul Islam | sst@farmingdale.edu | 934-420-2538
SST 115 Computer Forensics This course will introduce basic concepts of computer and digital hardware and software as they apply to challenges of computer and mobile forensics, including the process of analysis and examination of operating systems and file systems. Students will learn differences in evidence locations and examination techniques on Windows and Linux computers, as well as for common mobile devices. A concise survey of standard forensics tools commonly used in forensics investigations will be presented and reviewed for their latest features and applications. Legal issues governing the collection and handling of digital evidence will be explored. SST 310 Computer Security I This course focuses on security threats to an organization's data network such as hackers, intruders, industrial espionage and sabotage, fraud and theft. The components of computer security architecture are studied as well as the principles of security networking protocols, encryption, fault tolerance techniques, and file system protection. Additional topics covered include the protection of computer hardware and software. Prerequisite(s): BCS 109 or BCS 120 or (CRJ 115 or SST 115) or EET 110 SST 311 Computer Security II This course is a continuation of CRJ 310, and includes an analysis of the security features of computer operating systems. The course will review the OSI model and describe how systems communicate with one another. Also included in the course is a detailed study of authentication technologies and how they are used to secure an organization's assets and electronic transactions. Prerequisite(s): CRJ 310 or SST 310 SST 312 Computer Security III The course examines computer software threats which include the birth, life and termination of computer viruses, their modes of operation, detection techniques, virus signatures and virus removal methods as well as other "virus like" threats which are delivered by e-mail and internet/intranet packets. Prerequisite(s): CRJ 311 or SST 311 SST 314 Cybersecurity Law and Policy This course introduces students to the regulation and management aspects of cybersecurity. It will cover concepts and definitions regarding governance and policy at an organizational and national level within the cybersecurity landscape. In particular, this course will go through numerous laws, standards and policies created by organizations such as NIST, GDPR, COBIT, ISO and ISA that govern the cybersecurity industry. Prerequisite(s): CRJ 115 or SST 115 |
- Featured Results
- View all results
- No results found
- Directory
- No results found