Bachelor of Science in Cybersecurity
Mathematical facts, procedures, skills, and processes are indispensable in acquiring understanding within all fields of science and central to the development and practice of critical thought and communication. Computer science packages these essentials into program courses at Kentucky State University which integrate theoretical as well as practical topics to provide students with the advanced conceptual framework and technical expertise required to succeed in new and ever-changing markets.
Computer Science offers an Online Bachelor of Science program in Cybersecurity. Students will learn skills in programming, systems, networking and all things relative to Cybersecurity. The baccalaureate degree program in computer science is modeled in accordance with guidelines established by the Accreditation Board for Engineering and Technology (ABET).
Bachelor of Science in Cybersecurity
Computer Science offers the following options as Bachelor of Science majors:
Year 1 | ||
---|---|---|
Term 1 (Fall) | Hours | |
KSU 118 | Intro. to University Learning | 3 |
COS 108 | Prin Computer Science I | 4 |
ENG 101 | English Comp I | 3 |
MAT 115 | College Algebra | 3 |
Natural Science Elective | 3 | |
General Chemistry I (must be taken with CHE 110) or Life Science or Principles of Biology or Chemistry in Context or Survey Gen/Organic/Biochemi or Physical Sciences I |
||
Hours | 16 | |
Term 2 (Spring) | ||
ENG 102 | English Comp II | 3 |
COS 109 | Prin Computer Sci II | 4 |
COS 170 | Networking Fundamentals | 3 |
Arts | 3 | |
Introduction to Art or Introduction to Music or Introduction to Theatre or Intro to Literature |
||
Social or Behavioral Science Elective | 3 | |
Financial Literacy or General Psychology or Principles of Sociology or Prin of Economics I |
||
Hours | 16 | |
Year 2 | ||
Term 3 (Fall) | ||
ENG 216 | Technical Writing | 3 |
COM 103 | Interpersonal Communication | 3 |
COS 281 | Introduction to Info. Sec. & A | 3 |
COS 282 | Intro to Cryptography | 3 |
COS 310 | Discrete Computing Structures | 3 |
Hours | 15 | |
Term 4 (Spring) | ||
COS 200 | Computer Information Systems | 3 |
COS 260 | Mobile Security | 3 |
Humanities Elective | 3 | |
Business and Society or Cultural Responsiveness or Western Civilization or Intro to African American Hist |
||
Social or Behavioral Elective | 3 | |
Principles of Sociology or Financial Literacy or General Psychology or Prin of Economics I |
||
Free Elective | 3 | |
Hours | 15 | |
Year 3 | ||
Term 5 (Fall) | ||
COS 300 | System Design/Development | 3 |
COS 301 | Computer Organization | 4 |
COS 330 | Cloud Security | 3 |
Global/Civic | 3 | |
Global Perspect Ag/Food/Env or American Civil Rights Movement or World Politics or American Government |
||
Guided Elective | 3 | |
Hours | 16 | |
Term 6 (Spring) | ||
COS 302 | Operating Systems | 3 |
COS 334 | Computer Forensics | 4 |
COS 364 | Data Storage and Data Mining | 3 |
COS 410 | Database Management Systems | 3 |
Guided Elective | 3 | |
Hours | 16 | |
Year 4 | ||
Term 7 (Fall) | ||
COS 332 | Management Information Securit | 3 |
COS 460 | Artificial Intelligence | 3 |
COS 483 | Database Security | 3 |
COS 484 | Intro to Network Security | 3 |
Free Elective | 2 | |
Hours | 14 | |
Term 8 (Spring) | ||
COS 430 | Application Security | 3 |
COS 480 | Pene. Test & Vulner. Analysis | 3 |
COS 496 | Capstone Project | 3 |
Guided Elective | 3 | |
Hours | 12 | |
Total Hours | 120 |
Computer Science
An introduction to the foundations of Computer Science that incorporates the study of computer architecture, data representation, organization and storage, algorithm development and structured programming using C++ as a design tool.
A continuation of COS 108 with an extensive study of the manipulation of arrays, strings, record structure and files. A brief introduction to Object Oriented Programming is provided.
Overview of computer/based information systems, major models, applications and functions from a component perspective. Learn to describe physical and logical aspects of systems. Learn to present related material with intermediate HTML.
Credit Hours: 3 Contact Hours: 3
This course provides the foundation for understanding the key issues associated with protecting information asset, determining the levels of protection and response to security incidents, designing a consistent, reasonable information security system with appropriate intrusion detection and reporting features, and learning the principles of trusted computing bases (TCB).
This course provides a comprehensive foundation in the principles and practices of cryptography. This course covers the essential concepts, techniques, and applications of cryptographic methods to secure information in the digital age.
Credit Hours: 3 Contact Hours: 3
A study of computer systems design and development techniques. Includes the systems development cycle, requirements determination and analysis, specification development , Object-oriented (OOD) methods, system validation and verification, quality assurance and implementation.
A detailed study of the organization and structuring of a computer system. Topics include logical basis of computer structure, machine language, number systems, the mechanics of data transfer and control, and recent advances in computer organization.
An overview of the concepts and theories that underlie operating systems including: process and memory management strategies, file systems and protection, scheduling algorithms, multi/programming, distributed systems, and virtual memory.
Introduces mathematical topics needed in the study of Computer Science including logic, set theory, matrices, induction and recursion, discrete probability, relations, Graphs, Trees, etc..
This course focuses on the managerial aspects of information security and assurances. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security are included to reinforce key concepts. The course includes up-to-date information on changes in the field, such as national and international laws and international standards like the ISO 27000 series.
This course will deal with an exciting area of computer forensics, crimes, law and investigations. Date are collected from cell phones, mobile devices documents, e-mail, etc., and evidence is collected by using various forensics tools. The pretrial and courtroom experiences of a computer forensics investigator will also be discussed.
This course is an introduction to data warehouse design,modeling and data mining. It provides students with an understanding of the industry standard data mining methodologies, and with the ability of solving problems with it.
Detailed study of major database concepts and dominant models. Focus on hierarchical, relational, and object—relational systems as they are implemented in current DBMS. Student teams design and build a DBMS.
Introduces various topics related to the field of Artificial Intelligence including but not limited to logic, knowledge representation, expert systems, natural language processing, AI related problems, and AI languages.
This course provides the basics of cryptography and how it is used for Information Security.
This course will focus on issues related to the design and implementation of secure data stores. Emphasis will be placed on multilevel security in database systems; covert channels; and security measures for relational and object-oriented database systems.
This course introduces students to the fundamental techniques used in implementing secure network communication and gives them an understanding of common threats and attacks, as well as some practical experience in attacking and defending networked systems.