Interdisciplinary studies, project-based coursework and a focus on business skills make an accessible cyberprogram that appeals to a wider student pool than other cyber programs.
Job-focused and designed around real-world experience, it's designed to attract those interested in the 460,000+ open jobs in the field without needing to be superstar programmers.
Your school can launch this Cybersecurity program by adding 6-9 Rize courses to your existing catalog, enabling you to quickly market it to new students. The 6 primary courses forming the core of this curriculum are:
In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social skills and technology to facilitate cyber attacks and provide you with the tools and information you need to defend against those attacks. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you'll learn how to make the Internet safer.
Cybercrime is one of the biggest threats companies face on a daily basis, and they are constantly looking for new hires to help protect them. In this course, you will get a firsthand look at the methods used to commit cybercrimes. You will also learn how governments detect, investigate, and stop these crimes, and become familiar with the laws and policies in place to deter cybercriminals.
Just as technology is constantly evolving, so too must cybersecurity to keep pace with changing trends. In this class, you will learn about the changing landscape of cybersecurity, emerging technologies that are likely to be targeted, and new forms of cyber-attack being launched. By the end of the course, you will be able to implement the most up-to-date practices in cybersecurity in order to protect against attacks.
Modern organizations know that even the strongest systems can be vulnerable to cyber-attacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.
When cybercrimes do happen, you need to know how to respond. This course examines the tools and techniques used to perform cyber forensics and conduct investigations into cybercrimes. By the end of the course, you’ll be able to gather and analyze important digital evidence and gain skills in analyzing cybercrime that are in demand from companies across the country.
To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You will be prepped with tools to launch these offensive tactics, and then complete a hands-on project where they are asked to ethically hack a real system.
Dr. Charles Severance holds a PhD in Computer Science from Michigan State University. He is the former Executive Director of the Sakai Foundation, and one of the world’s leading online CS educators. His contributions and curriculum form the basis of our programming curriculum.
Randy is a professor of IT and Cybersecurity at Penn State, as well as an Engineering Manager at the Naval Nuclear Laboratory, where he focuses on both physical and cyber security systems. Randy holds a Masters in IT from Carnegie Mellon University.
Alexey is a highly respected engineer and Chief Technical Officer with a masters in Computer Science. His experience with FinTech (Financial Technology) and cloud-based systems have put him on the front lines of cybersecurity for the past decade.