The minor in cybersecurity is available to students who wish to develop knowledge and skills in computer security principles and applications. This minor consists of 5 classes totaling 15 credits. Four of these five courses are specific computer security courses, and the remaining elective course can be chosen from the SST/CPS/SET courses, Students will learn the cybersecurity concepts along with hands-on experience of security technologies. Students must maintain a cumulative GPA of 2.0 in the minor.  All students can participate in this minor except those who are majoring in Security Systems or Computer Security Technology.

Student Learning Outcomes: 

  • Students will acquire a fundamental knowledge of cybersecurity principles, including, confidentiality, integrity, and availability, information assurance, vulnerability assessment, and security design.
  • Students will develop the skills needed to identify, analyze, and remediate computer security breaches.
  • Students will develop an understanding of security laws, policies, and procedures.

About Academic Minors

Farmingdale State College students are invited to enhance their studies with an "Academic Minor." A minor is a cluster of thematically related courses drawn from one or more departments. In addition to department based minors (e.g. computer programming & info systems), interdisciplinary minors are also available (e.g. legal studies).

Academic minors are approved by the College-Wide Curriculum Committee and the Provost. Students must make application for an academic minor through the department offering the minor in conjunction with the Registrar's Office Specific course work must be determined in consultation with a faculty member in the department offering the minor. A statement of successful completion of the academic minor will appear on the student's transcript at the time of graduation.

  • A minor is considered to be an optional supplement to a student's major program of study.
  • Completion of a minor is not a graduation requirement and is subject to the availability of the courses selected. However, if the requirements for a minor are not completed prior to certification of graduation in the major, it will be assumed that the minor has been dropped. Consequently, the student will only be certified for graduation in their primary major.
  • Only students in 4 year baccalaureate programs can apply for a minor.
  • A minor should consist of 15 to 21 credits.
  • At least 12 credits must be in courses at the 200 level or higher.
  • At least 9 credits must be residency credits.
  • Specific requirements for each minor are determined by the department granting the minor. 
  • Students must maintain a minimum cumulative GPA of at least 2.0 in their minor.  Some minors may require a higher GPA.
  • Students are prohibited from declaring a minor in the same discipline as their major (e.g. one cannot combine an applied math minor with an applied math major). Academic minors may not apply to all curricula.
  • Students are permitted to double-count courses.
  • Students are only permitted to take more than one minor with appropriate written approval of their department chair or curriculum Dean.

Admission to Farmingdale State College - State University of New York is based on the qualifications of the applicant without regard to age, sex, marital or military status, race, color, creed, religion, national origin, disability or sexual orientation.

Contact Information

Computer Security

Dr. M. Nazrul Islam
Lupton Hall, Room 102
Monday-Friday 8:30am-5:00pm

Fall 2022

Subject to revision

SST 115 Computer Forensics 3
SST 310 Computer Security I 3
SST 311 Computer Security II 3
SST 312 Computer Security III 3
SST 314 Security Law and Policy 3

SST 115 Computer Forensics

This course will introduce basic concepts of computer and digital hardware and software as they apply to challenges of computer and mobile forensics, including the process of analysis and examination of operating systems and file systems. Students will learn differences in evidence locations and examination techniques on Windows and Linux computers, as well as for common mobile devices. A concise survey of standard forensics tools commonly used in forensics investigations will be presented and reviewed for their latest features and applications. Legal issues governing the collection and handling of digital evidence will be explored.

SST 310 Computer Security I

This course focuses on security threats to an organization's data network such as hackers, intruders, industrial espionage and sabotage, fraud and theft. The components of computer security architecture are studied as well as the principles of security networking protocols, encryption, fault tolerance techniques, and file system protection. Additional topics covered include the protection of computer hardware and software. Prerequisite(s): BCS 109 or BCS 120 or (CRJ 115 or SST 115) or EET 110

SST 311 Computer Security II

This course is a continuation of CRJ 310, and includes an analysis of the security features of computer operating systems. The course will review the OSI model and describe how systems communicate with one another. Also included in the course is a detailed study of authentication technologies and how they are used to secure an organization's assets and electronic transactions. Prerequisite(s): CRJ 310 or SST 310

SST 312 Computer Security III

The course examines computer software threats which include the birth, life and termination of computer viruses, their modes of operation, detection techniques, virus signatures and virus removal methods as well as other "virus like" threats which are delivered by e-mail and internet/intranet packets. Prerequisite(s): CRJ 311 or SST 311

SST 314 Cybersecurity Law & Policy

This course introduces students to the regulation and management aspects of cybersecurity. It will cover concepts and definitions regarding governance and policy at an organizational and national level within the cybersecurity landscape. In particular, this course will go through numerous laws, standards and policies created by organizations such as NIST, GDPR, COBIT, ISO and ISA that govern the cybersecurity industry. Prerequisite(s): CRJ 115 or SST 115

Last Modified 8/25/22