» Center for Cyber Defense
Center for Cyber Defense
The LeMoyne-Owen College Center for Cyber Defense provides a program of study in computer science with a concentration in cyber defense and program of study in criminal justice with a concentration in cyber defense, along with opportunities for students and faculty to collaborate and perform outreach with other institutions. The Center has a 30-person lab where students study using industry available digital forensics tools.
Introduction to Cyber Security: This course is to provide students with an understanding of cyber security. Topics include terminology, prevention, contingency planning, basic networking concepts, and current topics in cyber security.
Introduction to UNIX: This course covers the use of UNIX operating system as a program development environment. Topics include UNIX commands, text editor, system calls, file systems, shell scripting, and programming tools.
Network Security: This course is designed to provide a practical survey of both the principles and practice of cryptography and network security. Topics include an introduction to public-key encryption, access control, distributed authentication, firewalls, electronic mail security, IPSec, VPN, and intrusion detection systems.
Digital Forensics: The course addresses the study of forensic analysis from a digital prospective. Topics include digital crime scene investigations, evidence collection, evidence analysis, risk management, current topics on digital forensic analysis.
Cyber Ethics and Cyber Law: This course is a study of some of the principle theories of philosophical ethics in cyber security with emphasis on basic moral rules, the nature of moral reasoning, and the nature of moral judgments, along with a study of cyber law.
Forensic Evidence: This course provides the student with a basic understanding of the analysis of forensic evidence.
- Career opportunities in cyber defense include, but are not limited to:
- Computer Crime Investigator
- Computer Security Incident Responder
- Disaster Recovery Analyst
- Forensics Expert
- Incident Responder
- Intrusion Detection Specialist
- Network Security Engineer
- Security Architect
- Security Analyst
- Security Systems Administrator
- Security Software Developer
- Source Code Auditor
- Virus Technician
- Vulnerability Assessor