Bradley University offers the wide range of high-quality course focused on cybersecurity. Bradley’s computer information systems courses and management information systems courses prepare students to use information technology to provide businesses with valuable information. Courses give students a foundation in skills needed to manage the security of information systems and those who interact with them.
CIS 230 – Introduction to Computer Forensics (3 hours)
Provides an overview of computer forensics, investigation techniques, and relevant laws. Covers computer operating system architectures and disk structures and their relevance to computer forensics. Cross listed as CJS 230. Prerequisite: previous computer class or consent of instructor.
CIS 330 – Advanced Computer Forensics (3 hours)
Provides students an extensive look at computer forensics and formal techniques used in computer forensics in a lab environment. Formal techniques for conducting a computer forensics investigation including record-keeping are covered. Students will conduct computer forensic exams and participate in practical computer forensic examination exercises. Cross listed as CJS 330. Prerequisite: CIS 230 or CJS 230.
CIS 415 – Applied Cryptography (3 hours)
Various concepts, algorithms, and systems in the area of applied cryptography. Topics include but are not limited to overview of classical cryptography, various types of cryptographic algorithms and systems, block ciphers, advanced encryption standards, key management, digital certificates, design and development of cryptographic applications. Cross-listed with CIS 515. Prerequisite: CS 210 or CIS 210 or equivalent; or consent of instructor.
CIS 435 – Computer Networks and System Security (3 hours)
Principles, concepts, and fundamentals of computer networks and systems; and information technology infrastructure security, computer network authentication, authorization, access control, confidentiality, and data integrity. Topics of computer network security policy and management, data encryptions, protection against internal and external attacks, security evaluation and management will also be covered. Cross listed with CIS 535. Prerequisite: CS 220 or equivalent; or consent of instructor.
CIS 476 - Data Management (3 hours)
A study of techniques and processes to help organize, access, protect, and analyze data. Describe data collection, storage, and retrieval methods. Explain data integration and interoperability, including data transfer and exchange standards. Understand why it is important to define policies and procedures for data governance, quality, standards, security, and privacy. Describe different strategies for data analysis. Topics include data warehousing, database registries, data mining, NoSQL, and other Data Science techniques. Cross-listed with CIS 576. Prerequisite: CS 210 or CS 360 or equivalent
CIS 495 – Software and Web Applications Security (3 hours)
Concepts, models, methods, technologies, and tools used to design, develop, test, implement, and maintain secure software and Web applications. Threats posed to software and Web applications, software security concepts and protection mechanisms, trust and threat model, authentication and authorization, software risks assessment and management models, security management models for software and Web applications, secure programming and software development styles, tools to develop secure software and Web applications. Cross listed with CIS 595. Prerequisite: CS 390 or equivalent; or consent of instructor.
MIS 373 – Applied Networking (3 hours)
Gives students an understanding of basic network design concepts and an opportunity to apply them in a business context. Studies the functionality, performance and management of multiple network designs. Application of the theories, design and technologies utilized in modern business data communications networks. Prerequisite: 42 hours.
MIS 379 – Information Systems Security (3 hours)
An introduction to the various technical and administrative aspects of information security and assurance. Provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Prerequisite: Junior standing.
MIS 383 – Advanced Ethical Hacking (3 hours)
Provides students with hands-on experience with all phases of a security assessment for a live client. Students are responsible for planning the assessment, executing assigned tasks, and reporting results. Prerequisite: MIS 379 or CIS 435 or permission of instructor Corequisite: MIS 373 or CIS 430