- Omar Alfehri, Saudi Arabia
Prevent. Protect. Respond. Get cutting-edge, real-life experience with TU’s cyberdefense program. Students perform security vulnerability assessments for businesses, participate in hack-a-thons, conduct research and attend professional conferences. With hands-on learning and research opportunities, TU has placed interns at the FBI, NSA and United States Coast Guard Research.
The beauty of the Tiffin University Cyber Defense and Information Assurance major is that it is not narrowly focused. The curriculum addresses the entire range of cyber operations, from analyzing the largest national and international cyber policy issues, to collecting data off the smallest hand-held devices. Through this major, students are exposed to the entire breadth of the field.
The Cyber Defense and Information Assurance major addresses the evolving threats to our economy and society in cyberspace. The curriculum is designed to give students a solid background in technology applications, threat assessment, and mitigation. Using real-world case scenarios and threat actors, the program challenges students to think critically about interconnected systems and vulnerabilities. This diversified program culminates in a senior seminar that includes both Digital Forensics and Cyber Defense and Information Assurance students participating in a red team/blue team scenario, providing both teams the opportunity to manage an intrusion incident from inception to forensic analysis and reporting.
Core Curriculum of the School of Criminal Justice & Social Sciences 49 hours
Cyber Defense Major 42 hours
- JUS215 Homeland Security and Legal System
- CIS201 Programming
- CDS355 Penetration Testing and Vulnerability Analysis
- CDS344 Information Security
- CDS345 Cyber Law & Ethics
- CDS348 Incident Management
- CDS356 Malware Analysis
- CDS445 Cyber Warfare
- CDS491 Senior Seminar In Cyber Defense
- CIT155 Operating Systems
- CIT320 Architecture and Diagnostics
- CIT361 Network Management and Administration
- SCS300 Research Design
- SCS470 Internship
Total BA hours 121-123 hours
This is a sample course sequence to illustrate course offerings for this major. Consult the official Academic Bulletin for detailed registration and advising information.
On Campus - Offered in a 15-week semester format with start dates of January and August
There are no related concentrations available
Penetration Testing & Vulnerability Analysis (CDS355) - This course will equip students to evaluate a network to discover potential security vulnerabilities and rectify those issues. Students will learn the most common security mistakes as well as the necessary corrective action, and will be able to probe networks to determine if any of those common vulnerabilities can be exploited. The roles, missions, and appropriate applications of Red Teams and Blue Teams will be discussed.
Information Security (CDS344) - This course will introduce information security as an essential component in our war against terrorism. All information must be secure or the probability of winning the war will be diminished. With advances in technology and software, cyber-terrorism has become very real. Computer hackers and terrorists can shut down our nation’s most critical infrastructures. There can be no doubt that cyber-terror can pose a very real threat to this nation’s security. Students will become familiar with the entire arena of information security.
Cyber Warfare (CDS445) - This course explores the past, current, and future threats of information warfare and cyber terrorism. It provides an overview of information warfare and cyber terrorism techniques and capabilities of state and non-state actors through case study analysis. An exploration of current and future technology and development of information warfare and cyber terrorism techniques is utilized to develop future threat matrices and countermeasures.
Incident Management (CDS348) - This course will train students in methods used to work through and recover from a network incident, be it the result of network failure, natural disaster, or cyber-attack. Course material will include the various Mission Assurance Levels used by major portions of the U.S. Government, as well as how to plan, conduct, and gather lessons-learned from war games where Intentional failures have been planned in as part of the exercise. Finally, the role that damage assessment plays in post-incident response/recovery will be emphasized.
- Cyber Security Specialist
- Cyber Tech Writer
- Department of Defense
- Intelligence Analyst
- National Security Agency
- Network Security Engineer
- Policy Analyst or Technician with Department of Homeland Security
- US Cyber Command
- Department of Homeland Security Agencies
- Private Enterprise Providing Cyber Services
- Department of Defense Agencies