|
Nov 23, 2024
|
|
|
|
2024-2025 Undergraduate Catalog
Cybersecurity Minor
|
|
|
Cybersecurity Core (10-11 credits)
Select focus area and complete the three associated required courses. The two technical focus areas are based on the amount of technical depth and programming knowledge assumed. Technical Focus Area 1 is a more technical track targeted to SEAS majors, although it is open to any students who meet the required course prerequisites and SEAS admissions requirements. Managerial Focus Area 2 is a more managerial track targeted to SOM majors and other non-SEAS students, although it is also open to SEAS students who feel it better complements their technical education. Three Electives (9-12 credits)
Total Credits Required for Minor: 19-23
Total Credit Hours Required represents the minimum credits needed to complete this program, and may vary based on a number of circumstances. This chart should not be used for financial aid purposes. Academic Requirements
- Students must have a 2.0 GPA in minor courses to confer the minor.
- While not required, a project that will reflect a cybersecurity application in a specific track of interest and can be completed by doing an Independent Study (CSE 499 or MGS 499 ) with a faculty member is strongly recommended.
- A maximum of three courses from your UB Curriculum, major(s), and/or other minors can be applied towards the Cybersecurity Minor. Anything beyond three shared courses will need to be excluded by your Academic Advisor.
Program Distinction
A student in this major is eligible for Program Distinction upon degree conferral if the criteria are met. Criteria are found under Academic Honors in the Policy and Procedure section of this Catalog. Program Distinction is noted on the official transcript.
Learning Outcomes
The objective of the program is to provide students with depth of knowledge in methods and technologies related to cybersecurity fundamentals and applications and the opportunity to apply these methods and technologies firsthand.
Learning Objectives: - Identify and evaluate cybersecurity risks and develop and implement appropriate solutions for those risks.
- Explain why certain tools for penetration testing and security hardening are the most appropriate choices for use in a given environment.
- Use penetration testing tools to identify potential weaknesses and use security hardening tools to address known weaknesses.
- Identify and apply the principles, methods, and practices of cybersecurity in multiple domains, including operating systems, networks, and software.
- Effectively recognize and communicate potential ethical issues related to cybersecurity systems, solutions, and technology to both technical and non-technical audiences
|
|
|