About the Cyber Studies Consortium

Cyber Foundations II

Cyber Foundations II is an advanced fast-track cyber training curriculum for individuals wishing to pursue mid-level cyber careers. Upon completion of this curriculum, students are ready to take exams for industry certification as well as pursue study in a variety of undergraduate and graduate degree programs. The curriculum explores:

  • Management of information security for government, corporations, and other institutions
  • Risk assessment and management
  • Systems security principles, disaster recovery principles and planning, and incident response planning and execution
  • Network security management
  • Disaster recovery management
  • Web security management
  • Strategic planning for information security
  • Human elements in IT and cybersecurity operations including team dynamics and communications skills

Note: curriculum and course descriptions are accurate at time of initial publication, but are subject to change without notice. Please visit this page periodically to check for any revisions.

Prerequisite Knowledge Requirements

An undergraduate degree or equivalent is required. Students should have prior knowledge of computer operations, networking and other areas in the computer field. Students may have completed the Cyber Foundations I curriculum or required background classes at an undergraduate level, demonstrate the knowledge through comprehensive testing or previous experience in the field, or take preparatory courses at a pre-approved or accredited institution.

Cyber Foundations II Courses

Saint Leo University's Graduate Certificate in Information Security Management

  COM 510 Management of Information Security 3 credits

Information security is an essential part of any business plan, and managers need to be aware of the principles and methodology of managing information security. This course provides an in-depth view of the management of information security for government, corporations, and other institutions. Students will develop information security plans for sample organizations.

  COM 520 Systems Security Management 3 credits

Securing the systems that run our computers is the key to ensuring that our essential information remains safe and available. This course provides a foundation in systems security principles, disaster recovery principles and planning, and the importance of incident response planning and execution to minimize downtime. A computer system with appropriate software will be required.

Prerequisites: COM 510

  COM 530 Network Security Management 3 credits

Global and local networks provide capabilities for businesses and individuals that have become essential in the success of the world economy. Defending these systems against attacks is imperative. This course provides a solid foundation in the fundamentals of network security and some hands-on experience in network security. A computer system with appropriate software will be required.

Prerequisites: COM 510

  COM 540 Disaster Recovery Management 3 credits

Disaster recovery planning and management is a major requirement for situations where terrorism, natural disaster, or other threats must be faced and dealt with. This course provides the student with the capabilities to develop and maintain disaster recovery plans and manage the recovery in the event of a disaster.

Prerequisites: COM 510

  COM 545 Web Security Management 3 credits

Access to the World Wide Web and Internet for multiple purposes is one of the major components of most business operations. Many businesses also use the same protocols and processes to provide internal communications. Security of these assets is imperative for a successful business. This course provides the concepts and procedures of assessing and managing security for Web activities.

Prerequisites: COM 510

  COM 590 Strategic Planning for Information Security 3 credits

This course describes and demonstrates the application of information security forecasting methods, their implementation within organizations, and the development of a competitive strategic plan.

Prerequisites: COM 520, COM 530

Cyber Studies Consortium Competency-based Professional Training Courses, Certificate Program

  Risk Assessment and Management

Risk assessment and management is an essential part of information security and for business process - recognizing and responding to factors and events that can lead to a failure in the integrity or availability of an information system or a workflow/decision-making process. It also attempts to capture vulnerabilities and threats, including physical risks, and mitigate against the risk to business process or an information system and the information it contains from an accidental or intentional event within a context of prioritizing risks and the resources available to address them.

This course introduces the concept of risk, how risk affects organizational objectives and how a risk management methodology can be used to understand, communicate and address risk. It presents a practical risk management process from risk identification through analysis and evaluation to response and reporting. It also addresses the interaction with other organizational best practices including governance, compliance, audit, continuity and resilience. The course introduces an approach to incorporate risk management in operational strategies, plans and activities, including some typical risk management frameworks and architectures, how responsibilities should be allocated, implementation techniques and how to generate a risk-aware culture. Students will develop and apply risk assessment and management plans for sample organizations.

  Human Process Augmentation for Cyber Security Professionals

This course focuses on the often-ignored human element in information technology and security operations. It provides students with best practices in communication, personality assessment and leadership so they can be effective in team dynamics and fulfilling an organization's information technology and security objectives. Students will explore and practice adaptive team strategies to afford better analysis and solutions to problem sets.

  Global Perspectives - seminar and simulation

Multiple components comprise an understanding of information security. These include ethical and legal considerations as well as interactions with law enforcement and regulatory bodies and management of the relationships. Awareness of geo-politics is essential to the simulation's success. To that end, the background lecture preceding the simulation includes both US domestic and international developments and an analysis of how decision makers seek resolution - addressing legal, policy and operational considerations. By discussing contemporary operational counterterrorism and actions against global criminal networks (i.e., US policy with respect to drone missile attacks in Yemen, Pakistan and Afghanistan and challenges to international cooperation in law enforcement). Impromptu role-playing during the background lecture facilitates student understanding of the perspectives on the scenario differ by role or position. The primary purpose of mini role-playing is to familiarize students with the simulation concept and to seek to create a comfort zone.

  Field Project

Students will be assigned to participating organizations for field experience as a short-term mentorship or internship. They will have an opportunity to see cyber operations in the host organizations and apply the knowledge they have learned in practical applications. Subject matter and assignments will vary by the needs and requirements of the respective host organizations.

  Industry Certification

Complete a qualifying exam for industry certification from (ISC)2, CompTIA or similar certifying body.

Print Email