The Yeshiva of Newark offers a superior educational experience by partnering with IDT, Bellevue University, and YIEP, allowing us to provide state-of-the-art courses combining the best of online and in-person classroom experiences.
Bellevue University offers excellent courses and the National Security Agency, and the Department of Homeland Security have designated Bellevue University as a National Center of Academic Excellence in Information Assurance/Cybersecurity. Moreover, YIEP works with the University to ensure that the courses meet our Yeshiva standards and never conflict with Shabbos or Yom Tov.
When it comes to CyberSecurity, book learning provides only a fraction of the necessary skills required for top jobs in the field. Our partnership with IDT catapults us well beyond similar programs at highly respected universities by offering exclusive lectures and workshops by leading industry professionals, internships for direct application of theory to real-world situations, and job placement opportunities.
The field of cybersecurity is evolving rapidly as new risks and threats emerge. The Bellevue University Bachelor of Science in Cybersecurity offers an inclusive education in the theory and application of technical and non-technical security skills. The degree covers the relevant knowledge and skills to apply protection, detection, response technologies, and procedures. You will learn to apply them in various cyber security environments where you need to identify threats, vulnerabilities, exploits, and controls. Integrating hands-on, applied learning with theory, all Bellevue University degrees are designed to deliver a transformative learning experience that is flexible to accommodate your personal and work life.
The online Cyber Security degree emphasizes identifying, analyzing, mitigating, and communicating risks to cyber systems using various tools, techniques, and technologies. This degree will prepare you to:
Major Requirements: (36 credit hours)
The BS-Cybersecurity program is an inclusive education in the theory and application of technical and non-technical security skills. The program covers an array of abilities required by the quickly evolving cybersecurity industry. These skills include applying protection, detection, and response technologies and procedures to identify threats, vulnerabilities, exploits, and controls in various cyber environments. Emphasis is placed on identifying, analyzing, mitigating and communicating risks to cyber systems using various tools, techniques, and technologies.
This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.
This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer.
This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.
This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.
This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.
This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.
This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.
This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data – whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.
This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures.