Not a complete list, but somewhere to start
United States
- Arizona State University - Center for Cybersecurity and Digital Forensics
- Brown University - Executive Masters in Cybersecurity
- California State University- San Bernadino - Cyber Security Center
-
City College of San Francisco - Sam Bowne Class
- CNIT 40: DNS Security
DNS is crucial for all Internet transactions, but it is subject to numerous security risks, including phishing, hijacking, packet amplification, spoofing, snooping, poisoning, and more. Learn how to configure secure DNS servers, and to detect malicious activity with DNS monitoring. We will also cover DNSSEC principles and deployment. Students will perform hands-on projects deploying secure DNS servers on both Windows and Linux platforms. - CNIT 120 - Network Security
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs). - CNIT 121 - Computer Forensics
The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Prepares for part of the industry standard certification exam, Security+, and also maps to the Computer Investigation Specialists exam. - CNIT 123 - Ethical Hacking and Network Defense
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. - CNIT 124 - Advanced Ethical Hacking
Advanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks. - CNIT 126 - Practical Malware Analysis
Learn how to analyze malware, including computer viruses, trojans, and rootkits, using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools. - CNIT 127 - Exploit Development
Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals. - CNIT 128 - Hacking Mobile Devices
Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal. - CNIT 129S: Securing Web Applications
Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code. - CNIT 140: IT Security Practices
Training students for cybersecurity competitions, including CTF events and the Collegiate Cyberdefense Competition (CCDC). This training will prepare students for employment as security professionals, and if our team does well in the competitions, the competitors will gain recognition and respect which should lead to more and better job offers. - Violent Python and Exploit Development
In the exploit development section, students will take over vulnerable systems with simple Python scripts.
- CNIT 40: DNS Security
-
Colorado State University - Undergraduate Certificate CyberSecurity Graduate Certificate CyberSecurity
-
DePaul University - Cybersecurity
-
Drexel University - Graduate Certificate in Cybersecurity and Information Privacy Compliance
-
Florida Atlantic University - Center for Cryptology and Information Security
-
Florida State University's - Offensive Network Security
This class allows students to look deep into know protocols (i.e. IP, TCP, UDP) to see how an attacker can utilize these protocols to their advantage and how to spot issues in a network via captured network traffic. The first half of this course focuses on know protocols while the second half of the class focuses on reverse engineering unknown protocols. This class will utilize captured traffic to allow students to reverse the protocol by using known techniques such as incorporating bioinformatics introduced by Marshall Beddoe. This class will also cover fuzzing protocols to see if the server or client have vulnerabilities. Overall, a student finishing this class will have a better understanding of the network layers, protocols, and network communication and their interaction in computer networks. -
Florida State University's - Offensive Computer Security
The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary, an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing and secure system administration. -
Fordham University - Master of Science in Cybersecurity
-
George Mason University - The Center for Secure Information Systems (CSIS)
-
Harvard: Cybersecurity: Managing Risk in the Information Age online short course, Course Prospectus
-
Harvard Extension School: Cyber Security Certificate
-
Indiana University - School of Informatics and Computing
-
John Hopkins – Information Security Institute
-
Michigan State University - Institute for Cyber Enabled Research - Best Practices for HPC Software Developers
-
NYU Tandon School of Engineering - OSIRIS Lab's Hack Night
Developed from the materials of NYU Tandon's old Penetration Testing and Vulnerability Analysis course, Hack Night is a sobering introduction to offensive security. A lot of complex technical content is covered very quickly as students are introduced to a wide variety of complex and immersive topics over thirteen weeks. -
Norwich University- Computer Security & Information Assurance
-
Old Dominion University - Center for Cybersecurity Education & Research
-
Penn State University - Online - Master of Professional Studies in Information Sciences - Cybersecurity and Information Assurance
-
Rensselaer Polytechnic Institute - Malware Analysis
This course will introduce students to modern malware analysis techniques through readings and hands-on interactive analysis of real-world samples. After taking this course students will be equipped with the skills to analyze advanced contemporary malware using both static and dynamic analysis. -
R.I.T - Golisano College of Computing and Information Sciences
-
Stanford- Advanced Computer Security Certificate
- Cyber Security Graduate Certificate
- Computer and Network Security
- Crypto Currencies: Bitcoin and Friends
- Introduction to Cryptography
- Operating Systems and Systems Programming
- Technology and National Security
- Advanced Computer Security Professional Certificate
- Cyber Security and Executive Strategy
- Emerging Threats & Defenses
- Mobile Security
- Network Security
- Software Security Foundations
- Using Cryptography Correctly
- Writing Secure Code
- Cyber Security Graduate Certificate
-
Syracuse University- M.S. in CyberSecurity
-
The Citadel - Graduate Certificate
-
The George Washington University - Master of Engineering in Cybersecurity Policy and Compliance
-
The George Washington University – Cyber Security & Privacy Research Institute
-
The University of Arizona - Masters in CyberSecurity
-
The University of Illinois – Center for Information Assurance Education
-
The University of Maryland- Cybersecurity Center
-
The University of Rhode Island - The Digital Forensics and the Cyber Security programs
-
The University of Texas- Austin - Infosec
-
The University of Texas - Dallas - Certificate in Cybersecurity
-
The University of Texas - San Antonio - B.B.A Cyber Security
-
The University of Washington - Center for Information Assurance & Cybersecurity
-
University of California - Berkley - Information and Cybersecurity
-
UCLA - Cybersecurity Certificate
-
University of Delaware - Online - M.S. Cybersecurity
-
University of Nebraska - Cybersecurity
-
University of Phoenix - Advanced Cyber Security Certificate (Undergraduate)
-
University of San Diego - M.S. in Cyber Security Operations & Leadership
-
University of Southern California - Master of Science in Cyber Security Engineering I Cyber Security Specialization
-
Villanova University - M.S. in Cybersecurity
-
WORCESTER POLYTECHNIC INSTITUTE - Cyber Security Certificate
No comments:
Post a Comment