{"id":123,"date":"2021-02-02T22:55:44","date_gmt":"2021-02-02T22:55:44","guid":{"rendered":"https:\/\/www.eou.edu\/computer-science\/?page_id=123"},"modified":"2021-09-22T15:02:34","modified_gmt":"2021-09-22T15:02:34","slug":"cybersecurity-degree","status":"publish","type":"page","link":"https:\/\/www.eou.edu\/computer-science\/cybersecurity-degree\/","title":{"rendered":"Cybersecurity Degree"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>As the newest edition to the Computer Science department<\/strong>, the cybersecurity program will bring an operational focus to defending an organization\u2019s environment. Scheduled to start in the Fall 2021, students will have both a BS and BAS route to customize their education. The curriculum is built on top of the existing Computer Science courses by adding a cross section of cybersecurity topics. Students will be exposed to topics for different specializations of cybersecurity, with an emphasis on hands-on application.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-navy-background-color has-text-color has-background no-border-radius\" href=\"https:\/\/www.eou.edu\/academics\/cyber-security-major\/\">Cybersecurity Degree Program Checksheet<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-gold-background-color has-text-color has-background no-border-radius\" href=\"https:\/\/online.eou.edu\/programs\/bachelors-cybersecurity\/\">EOU Online Cybersecurity Degree<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-1230\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Cybersecurity Course Offerings<\/h2><div id=\"ac-1230\" class=\"c-accordion__content\">\n<h4 class=\"wp-block-heading\"><strong>CS 350<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>Wireless &amp; RF Fundamentals\/Security<\/strong><\/h4>\n\n\n\n<p>A study of basic radio frequency communication &amp; the associated security implementations. This course provides students with a foundation in how systems communicate over various wireless technologies, such as WiFi, RFID &amp; Bluetooth and the actions taken to secure them. <strong>Prerequisites: <\/strong>Math 111, CS 162 or equivalent<strong>&nbsp;&nbsp; <\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 372&nbsp;<\/strong>  <strong>Operational Cyber Security Essentials&nbsp;&nbsp;&nbsp;<\/strong><\/h4>\n\n\n\n<p>A hands-on examination of cyber security concepts that cover both the defensive and offensive arenas. This course provides students with foundational technical cyber security skills needed for success in both a Windows and Linux environment. <strong>Prerequisite:<\/strong> CS 162 or equivalent.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 373<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>Foundations of Information Security Management<\/strong><\/h4>\n\n\n\n<p>A survey of the principal topics across the information security field. This course provides students a broad understanding of the field, the terminology, and the industry standards governing it. UWR. <strong>Prerequisite<\/strong>: CS 162 or equivalent.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 386<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>System Hardening\/Secure Configurations<\/strong><strong>&nbsp;&nbsp;&nbsp;<\/strong><\/h4>\n\n\n\n<p>An applied study of how to secure Windows and Linux environments. This course provides students the necessary skills to build defensible environments in order to both limit the likelihood of a breach, as well as detect a security incident. Defensive concepts will be paired with the attack scenarios to aid students in understanding why certain actions are preferred. <strong>Prerequisite<\/strong>: CS 372<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 412<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>Incident Response &amp; Sys Forensics<\/strong><strong>&nbsp;&nbsp;&nbsp;<\/strong><\/h4>\n\n\n\n<p>A practical examination of how to respond to a security breach and perform system forensics. This course provides students the skills and knowledge necessary to aid during a security breach or malicious activity at an organization. Topics start with the necessary planning preparations and continue through detecting, containing, performing system forensics, and finally documenting and dealing with law enforcement or governing agencies. <strong>Prerequisite<\/strong>: CS 372<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 413<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>Reverse Engineering\/Malware Analysis<\/strong>&nbsp;&nbsp;&nbsp;<\/h4>\n\n\n\n<p>A study of reverse engineering applications with a focus on the analysis of malicious software. This course covers a review of assembly languages, the use of a decompiler &amp; debugger, static &amp; behavioral analysis. Students will understand the tools and methodology used to reverse applications, and the techniques used by malware. <strong>Prerequisite<\/strong>: CS 372, CS 314 or equivalent.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 431<\/strong><strong>&nbsp;&nbsp;&nbsp; <\/strong><strong>Application Security<\/strong><strong>&nbsp;&nbsp;&nbsp;<\/strong><\/h4>\n\n\n\n<p>A pragmatic study of application security from development through deployment. This course provides students the skills for finding common vulnerabilities in software, identifying deployment and configuration failures, understanding how vulnerable software is exploited and documenting findings for business leaders. <strong>Prerequisites<\/strong>: CS 372<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>CS 433&nbsp;&nbsp;&nbsp; Offensive Security Tactics &amp; Techniques&nbsp;&nbsp;&nbsp; <\/strong><\/h4>\n\n\n\n<p>An in-depth examination of the tactics and techniques used by security professionals to assess the defensive posture of an organization, as well as those used by malicious attackers. This course provides students with the necessary skills to perform &#8220;red team&#8221; and network penetration assessments used in a corporate environment, as well as provide a foundation in threat intelligence. <strong>Prerequisite<\/strong>: CS 372 or equivalent.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-1231\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Faculty<\/h2><div id=\"ac-1231\" class=\"c-accordion__content\">\n<p><strong>Jenelle Davis<\/strong><br>Adjunct Instructor, came to EOU in 2019. Jenelle is a Computer Science Practitioner for 20 years in Government, Telecommunications, and Consulting. Jenelle has served as a Computer Science Instructor for 14 years. Her specializations include Networking, CyberSecurity, and Application Development.<\/p>\n\n\n\n<p>E. <a href=\"mailto:jdavis19@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">jdavis19@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Tim Harrison<br><\/strong>Assistant Professor, came to EOU in 2018. Tim was a computer scientist for 30 years and a grades 6-12 computer science teacher for 6 years before coming to EOU. Tim designed and developed tools (software, methods, and training) to improve software development practices for the U.S. defense industry for 15 years. Then, he taught\/consulted object-oriented technology for 15 years. Tim\u2019s specialties are object-oriented technology (analysis, design &amp; programming), requirements analysis, programming languages, and computer science education.<\/p>\n\n\n\n<p>O. BH 107D<br>T. 541-962-3084<br>E. <a href=\"mailto:tcharrison@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">tcharrison@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Khaled Sabha<br><\/strong>Adjunct Instructor, came to EOU in 2020. He has over ten years of industrial as well as teaching experience. He is currently a full-time senior lecturer for the University of Wisconsin-Milwaukee (UWM). Khaled\u2019s specialties are computer networking, programming, &amp; cybersecurity.<\/p>\n\n\n\n<p>E. <a href=\"mailto:ksabha@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ksabha@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Samuel Sambasivam, Ph.D.<br><\/strong>Adjunct Instructor, came to EOU in 2020. He has served in higher education for over 33 years in both face-to-face and online education. He has done extensive research, written for publications, and given presentations in computer science and mathematics. His current research interests include Big Data Analytics, Cybersecurity, Artificial Intelligence, E-learning Technologies, Software Engineering, and Client\/Server Applications, Genetic Algorithms, and XML Database Applications. He has taught a variety of Computer Science courses in both undergraduate and graduate programs<\/p>\n\n\n\n<p>E. <a href=\"mailto:ssambasivam@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ssambasivam@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Greg Schulberg<br><\/strong>Adjunct Instructor. Greg has a background in electrical engineering and worked for many years as an engineer, and later as a professional software developer a for large telecommunications company. His specialties in computer science are software engineering and architecture. He is currently a full-time faculty member in the math and computer science department at Blue Mountain Community College.<\/p>\n\n\n\n<p>E. <a href=\"mailto:gschulbe@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">gschulbe@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Steve Sheehy<\/strong><br>Assistant Professor. Steve was a software engineer for 24 years before coming to EOU, building software for the telecommunications industry. Steve\u2019s specialties are object-oriented programming, software engineering, and database management systems.<\/p>\n\n\n\n<p>O. BH 107B<br>T. 541-962-3065<br>E. <a href=\"mailto:ssheehy@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ssheehy@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Kiel Wadner<\/strong><br>Senior Instructor II, came to EOU in 2019. With a background in software engineering for enterprise environments, Kiel is an information security professional. He specializes in cyber security, spanning both the offensive and defensive arenas.<\/p>\n\n\n\n<p>O. BH 107A<br>T. 541-962-3703<br>E. <a href=\"mailto:wadnert@eou.edu\" target=\"_blank\" rel=\"noreferrer noopener\">wadnert@eou.edu<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Brian Scavatto<\/strong><br>Adjunct Instructor, came to EOU in 2020. Brian is a cybersecurity practitioner with over 10 years of experience in local\/federal law enforcement, the U.S. Intelligence Community, and most recently within the financial services sector. Brian has been instructing courses in computer science and cybersecurity for six years. Brian\u2019s areas of expertise are incident response, cyber risk, cyber threat intelligence, insider threat, and network defense.<\/p>\n\n\n\n<p>E.&nbsp;<a rel=\"noreferrer noopener\" href=\"mailto:bscavotto@eou.edu\" target=\"_blank\">bscavotto@eou.edu<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As the newest edition to the Computer Science department, the cybersecurity program will bring an operational focus to defending an organization\u2019s environment. Scheduled to start in the Fall 2021, students will have both a BS and BAS route to customize their education. The curriculum is built on top of the existing Computer Science courses by [&hellip;]<\/p>\n","protected":false},"author":491,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-123","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/pages\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/users\/491"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":6,"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":161,"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/pages\/123\/revisions\/161"}],"wp:attachment":[{"href":"https:\/\/www.eou.edu\/computer-science\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}