Bellevue University Tops U.S. News Rankings

Course Listing For CYBR Courses

  • CYBR 105 Evils of the Internet Exposed

    This course explores technologies and techniques for security information and computer systems. Topics include security PCs and mobile devices, privacy on the Internet, online ethics, and basic protection methodologies. Coverage also includes computer, network, and the Internet fundamentals. The course provides hands-on experience using various systems and tools to reinforce security concepts and theories.

  • CYBR 250 Introduction to Cyber Threats, Technologies and Security

    This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.
    University Syllabus

  • CYBR 320 Operational Security

    This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics include security structure, leading security projects, policy management, human factors of security, and physical security methods.
    University Syllabus

  • CYBR 340 Operating Systems and Mobile Device Security

    This course focuses on the skills required to secure base operating systems on server, desktop, virtual, and mobile platforms. Coverage includes the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Discussion also includes protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.
    University Syllabus

  • CYBR 350 Web, Commerce and Application Security

    This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.
    University Syllabus

  • CYBR 410 Data/Database Security

    This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data – whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.
    University Syllabus

  • CYBR 420 Cyber Investigations and Forensics

    This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
    University Syllabus

  • CYBR 433 Cybercrime and Business

    This course focuses on security risk management through the use of real-world security problems, issues, and situations found in businesses today. Particular attention is directed to identifying business risks in cyber systems and managing business policies and practices in the areas of Finance and Accounting in order to comply with cybersecurity laws, regulations, and standards. This course is suitable for students majoring in Cybersecurity, Information Systems or Business, or anyone interested in managing security risks in an organization.
    University Syllabus

  • CYBR 436 Security for Healthcare

    This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.
    University Syllabus

  • CYBR 450 Advanced Cybersecurity Concepts

    This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today.
    University Syllabus

  • CYBR 510 Physical, Operations, and Personnel Security

    This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.
    University Syllabus

  • CYBR 515 Security Architecture and Design

    This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
    University Syllabus

  • CYBR 520 Human Aspects of Cybersecurity

    This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.
    University Syllabus

  • CYBR 525 Ethical Hacking and Response

    This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
    University Syllabus

  • CYBR 545 White Collar Crime

    This course explores common techniques, tools, and technologies for committing white-collar cyber crimes. Topics include fraud prevention, anti-money laundering, investigative methodologies, and protecting privacy. Case students will demonstrate real-world scenarios of white collar crimes, how to prevent or deter them, detection methods, and response techniques.
    University Syllabus

  • CYBR 610 Risk Management Studies

    This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.
    University Syllabus

  • CYBR 613 Control System Security

    This course explores risks associated with Industrial Control Systems (ICS) within and across critical infrastructure and key resource sectors. Topics include a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. This includes activities to reduce the likelihood of success and severity of impact of a cyber-attack against critical infrastructure control systems through risk-mitigation activities.
    University Syllabus

  • CYBR 615 Cybersecurity Governance and Compliance

    This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.
    University Syllabus

  • CYBR 623 Advanced Computer Forensics

    This course provides cybersecurity students with an advanced study of computer, network, and device forensics as a part of investigations. Students will conduct hands-on forensic research to identify how digital media and/or digital networks were compromised and the method(s) of intrusion employed. Students will be able to review what data is stored on a device, how the device services are consumed, and what methods attackers (and forensic analysts) deploy to retrieve information without an owner’s permission. Pre-requisite: CIS 607.

  • CYBR 625 Business Continuity and Recovery Planning

    This course provides the student with an opportunity to identify the processes associated with business continuity planning and disaster recovery. Business continuity topics such as project scope and planning, assessing risk, developing policy and procedures, conducting business impact analyses, recovery strategies, recovery plan development, and implementation are explored. Disaster recovery will be discussed in terms of recovery plan development, implementation, and restoration.
    University Syllabus

  • CYBR 627 Advanced Cybersecurity Testing

    This course builds on CYBR 525 and explores advanced concepts, methods and techniques in preparing and conducting penetration tests on computers, networks, and devices. Students will employ various tools as well as unravel complex methods for exploiting client-side, service side and privilege escalation attacks. They will use advanced tools, techniques, and technologies for determining vulnerabilities in information systems and applications. Students will construct a final report outlining discovered vulnerabilities, make suggested recommendations to remediate and/or mitigate those vulnerabilities. Pre-requisite: CYBR 525.

  • CYBR 650 Current Trends in Cybersecurity

    This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments. Prerequisite: Recommend CYBR 515
    University Syllabus

Thanks for your interest in Bellevue University.

When you click the submit button below, our staff will contact you within 48 hours to get you the information you need and answer any questions.

Yes No