Augusta UniversityWebsiteAcademic Catalog
School of Computer and Cyber SciencesDepartment Website
BS Degree in Cybersecuritysource 1source 2
CS Courses
- Principles of Computer Programming ICSCI 1301 (4)introCSCI 1301: Principles of Computer Programming I
A rigorous study of the principles of computer programming with emphasis on problem solving methods which result in correct, well-structured programs. Other topics: an introduction to data representation, data types and control structures, functions, and structured data types.
- Principles of Computer Programming IIorTechnical Elective (3000+)CSCI 1302 (3)introCSCI 1302: Principles of Computer Programming II
A continuation of problem solving methods and algorithm development. Topics include data structures and their implementation, algorithm development and programming. The emphasis is on program development and style.
- Principles of Scripting and AutomationAIST 2120 (3)introAIST 2120: Principles of Scripting and Automation
An intermediate programming course focused on solving and automating common information technology challenges using a contemporary scripting language. Topics include command line interfaces, scripted control structures, arrays and dictionaries, object-oriented design concepts, and text processing.
- Introduction to Web DevelopmentAIST 2220 (3)introAIST 2220: Introduction to Web Development
Students will be exposed to appropriate format and page layout, adding and manipulating visuals, images, and rich media, creating a navigation scheme and linking together multiple pages and sites, creating basic forms, building interactive features, and publishing/maintaining web sites.
- Introduction to Networking and Cyber SecurityCYBR 2600 (4)sysCYBR 2600: Introduction to Networking and Cyber Security
Introduces networking technology and information security practices. Topics include network models and protocols as well as information security fundamentals. The course includes hands-on lab activities where techniques and procedures are demonstrated and implemented.
- Principles of Data Management and AnalysisMINF 2650 (3)sysMINF 2650: Principles of Data Management and Analysis
An introduction to information systems with a focus on the collection, manipulation and analysis of structured data. Students will utilize spreadsheets and relational databases to formulate solutions to common business challenges. In addition to fundamental data planning and modeling concepts, students will be introduced to data analysis and visualization techniques, as well as the use of structured programming to automate some data management tasks.
- Ethics in Computer ScienceCSCI 2700 (2)impactCSCI 2700: Ethics in Computer Science
A study of the ethical, social and legal impacts of computers and their applications. Specific attention will be paid to professional responsibility, issues of privacy, property rights, legal issues and real risks. Corequisite: CSCI 1301.
- Cyber Network Defense and Counter MeasuresCYBR 3200 (3)sysCYBR 3200: Cyber Network Defense and Counter Measures
Emphasis placed on understanding the tools and devices used to secure a computer network (i.e. firewall, IDS, IPS). Course includes hands-on lab activities where techniques and procedures are displayed and tested.
- TCP/IP Protocol AnalysisAIST 3320 (3)sysAIST 3320: TCP/IP Protocol Analysis
Introduces network packet analysis and network traffic analysis techniques. Course provides in-depth coverage of the TCP/IP protocol suite. Popular diagnostic tools are used to monitor protocols in action and to understand how the network protocols work.
- Project ManagementMINF 3625 (3)softengMINF 3625: Project Management
Project management is the use of a standardized set of documented processes to control projects in an organization. This course addresses the life cycle of a project, the management of the project, how a project scope is written, how the time management is constructed and communicated.
- Operating System Concepts and AdministrationAIST 3720 (3)sysAIST 3720: Operating System Concepts and Administration
An introduction to operating systems geared towards future administrators. Includes coverage of operating system roles, functions and services, hardware components, virtualization, and the installation, configuration, and administration of a secure operating system.
- Digital ForensicsCYBR 4400 (3)sysCYBR 4400: Digital Forensics
Overview of information security forensics activities. Topics include digital forensics investigative basics, techniques, and digital forensics examination criteria. Course includes hands-on lab activities where techniques and procedures are displayed and tested.
- Enterprise System ArchitecturesAIST 4720 (3)sysAIST 4720: Enterprise System Architectures
A broader examination of operating systems as used in secure, large-scale enterprise environments. Includes coverage of virtualized/hosted/cloud-based systems and services, network storage, configuration & change management, distributed authentication, and other contemporary concepts.
Math/Stat Courses
- College AlgebraMATH 1111 (3)mathMATH 1111: College Algebra
A symbolically intensive functional approach to algebra that incorporates the use of appropriate technology. Emphasis will be placed on the study of functions and their graphs, inequalities, and linear, quadratic, piece-wise defined, rational, polynomial, exponential, and logarithmic functions. Appropriate applications will be included.
- Elementary StatisticsMATH 1401 (3)mathMATH 1401: Elementary Statistics
A study of frequency distributions of data, graphical and numerical presentations of data, probability, discrete and continuous distributions, sampling distributions, estimation, hypothesis testing, simple linear regression and correlation and goodness of fit.
- Math for Business and EconomicsMATH 3210 (3)mathMATH 3210: Math for Business and Economics
A description of the applications of linear models, simple non-linear models, applied probability, and selected topics from calculus. Additional topics may include a discussion of quadratic models, conditional probability, Bayes’ Theorem, and Markov Chains.
Science Courses
- orPrinciples of Biology IIBIOL 1108 (3)sciBIOL 1108: Principles of Biology II
A continuation of Biology 1107 studying the unifying concepts of the biotic world including physiological systems of both plants and animals, animal and plant diversity, animal and plant development, ecology and evolution, and animal behavior.
oror
Other Courses
- Fundamentals of Human CommunicationorCOMM 1100 (3)communicationCOMM 1100: Fundamentals of Human Communication
An introduction to the practice of public communication with special emphasis on public speaking. Includes the historical roots of communication models, audience adaptation, systematic library research, preparation and delivery of presentations, and preparation and use of visual aids.
- 3 × Wellness course
- 6 × Free Electives
Program-Level Learning Outcomes
Students who graduate with a Bachelor of Science in Cybersecurity will be able to:
- Analyze a problem, and identify and define the computing requirements appropriate to its solution.
- Design, implement, and evaluate a computer-based solution to meet a given set of computing requirements in the context of the discipline.
- Communicate effectively with a range of audiences about technical information.
- Make informed judgments in computing practice based on legal and ethical principles.
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables.
- Identify and analyze user needs and take them into account in the selection, integration, evaluation, and administration of computer-based systems.
- Apply security principles and practices to the environmental, hardware, software, and human components of a system.
- Apply protective technology and forensic techniques.
- Analyze and evaluate components and systems with respect to security and to maintaining operations in the presence of risks and threats.