COSC 4367

Firewall & Intrusion Detection Systems

Applied course focusing on firewalls, IPS/IDS technology, TCP/IP and OSI models, attack traffic analysis, and network-based and host-based security systems.

Topics

  • Windows, Linux, Check Point and Cisco firewalls
  • Network firewalls (pfSense)
  • Signature-based NIDS
  • SIEM architecture and threat hunting
pfSense Suricata Zeek SIEM
COSC 4365

Windows Security

Advanced system administration focusing on operating systems, servers, file systems authentication, user support services, and Active Directory environments.

Topics

  • User and group administration
  • Active Directory and GPO
  • Server and workstation integration
  • Backup and restoration strategies
AD GPO PowerShell Windows Server
COSC 2465

Linux Systems

Essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, file systems, authentication, and user support services.

Topics

  • User and group administration
  • DHCP and DNS
  • SSH and backup strategies
  • Integrated mass storage technologies
Bash systemd SSH Linux Admin
COSC 3474

Cyber Defense I

Covers cryptographic tools and algorithms, types of malicious software, forms of attacks, software security, and secure coding principles.

Topics

  • Cryptographic systems and attacks
  • Malicious software analysis
  • Attack detection and signatures
  • Secure coding principles
Cryptography Malware Secure Coding Attack Analysis
COSC 3372

Network Security

Introduction to fundamentals of computer and network security, security laws and ethics, vulnerability identification, attack forms, countermeasures, and detection/defense techniques.

Topics

  • Vulnerability identification
  • Attack forms and countermeasures
  • Hardware, software, and data security
  • Physical security
Security+ Network Defense Vulnerabilities Security Ethics
COSC 4368

Penetration Testing

Focuses on recognizing potential cyber attackers and identifying vulnerabilities through vulnerability analysis tools. Covers auditing, monitoring, incident response, and system recovery.

Topics

  • Vulnerability analysis tools
  • Security log analysis
  • Incident response and handling
  • System recovery procedures
Pen Testing Vulnerability Analysis Incident Response Log Analysis
COSC 4342

Computer Networks

Advanced computer network architectures, protocols, and programming. Overview of data communication and networking from classic to modern perspectives, emphasizing design principles.

Topics

  • OSI seven layers
  • Protocol and topology design
  • Network control
  • Modern wireless integration
OSI Model Protocols Network Architecture Wireless
COSC 2466

Network Systems

Standards and technologies for inter-network structures supporting TCP/IP data streams. Introduces LAN and WAN, covering TCP/IP, OSI models, cabling, switches, routers, and subnetting.

Topics

  • TCP/IP and OSI models
  • Switches and routers
  • Subnetting
  • Initial switch and router configuration
TCP/IP Switches Routers Subnetting
COSC 4369

Incident Response

Standards and technologies for organizational structures supporting IT incident response, business continuity, and disaster recovery. Covers planning concepts, tools, and techniques.

Topics

  • Incident response planning
  • Business continuity planning
  • Disaster recovery planning
  • Attack traffic analysis
Incident Response BCP DRP IR Planning

Classroom-Tested Lab Exercises

Labs built to feel like real work: clear asks, real constraints, and deliverables you can grade. Each lab is designed to produce something tangible: a diagram, a ruleset, a short report, a detection rule, or a validated change.

01

Clear Objectives

Students know what "done" looks like

02

Explicit Constraints

Assume legacy systems and limited time

03

Reproducible Setup

Reset-friendly for instructors

04

Concrete Deliverables

Grading-friendly artifacts

01

OT Network Segmentation Baseline

Students start with a "flat" environment, identify what must communicate, define zones, then implement minimum viable segmentation without breaking required traffic.

Time: 60–90 min
Deliverables:

Zone diagram, ruleset export, short "what broke / how fixed it" note

OT ICS Segmentation pfSense
02

Telemetry First: What Should You Log?

Students decide what visibility is required before enforcing controls. The focus is building a defensible logging plan that supports investigation and change validation.

Time: 45–75 min
Deliverables:

Log source list, sample events, brief justification for each source

Logging Zeek Suricata Evidence
03

Active Directory Least Privilege Audit

Students identify over-privileged accounts and groups, propose safer access paths, implement changes, then validate that required access still works.

Time: 60–90 min
Deliverables:

Before/after access report, change log, validation notes

Windows AD GPO PowerShell
01

Requirements → Plan

Turning messy requirements into a clear technical plan

02

Safe Changes

Making changes safely (measure → change → verify)

03

Evidence-Based Decisions

Explaining decisions with evidence instead of guesswork

04

Professional Documentation

Documenting outcomes like a junior analyst or engineer would

Labs are not puzzles with hidden tricks.
They are simulations of real work: incomplete information, imperfect systems, and limited time.