UVa Course Catalog (Unofficial, Lou's List)
Complete Catalog of Courses for the Certificate in Cyber Security Management-Graduate    
Class Schedules Index Course Catalogs Index Class Search Page
These pages present data mined from the University of Virginia's student information system (SIS). I hope that you will find them useful. — Lou Bloomfield, Department of Physics
Business
BUS 5010Cybersecurity Management (3)
Provides managers with the essential framework needed to design and develop an effective cybersecurity program. Explores methods used to raise general security awareness, review current industry practices, and develop expertise needed to adapt policies to achieve confidentiality, integrity, and availability of organizational assets and data.
BUS 5020Security Policy Development and Assessment (3)
Examines the steps required in policy development including password protection, acceptable use of organization information technology assets, risk acceptance, identification of threats, countermeasures, intellectual property, proprietary info and privacy issues, compliance reporting, and escalation procedures. Discusses access controls, security standards, and policy implementation.
BUS 5030Designing Dynamic Security Architecture (3)
Explores the building blocks needed to implement security within the System Development Life-Cycle (SDLC). Focuses on how to analyze internal applications, computing platforms/network infrastructure, and corporate objectives with an eye toward designing flexible security architecture that is best suited for the enterprise. Studies in-depth defense techniques and how they are applied to optimize security architecture.
BUS 5040Creating and Conducting a Security Assessment (3)
Reviews the essential components of a security assessment and explores how to integrate methodology with company needs. Covers the pitfalls connected with conducting a security assessment. Addresses how to create security assessment reports, identifying threats and vulnerabilities and managing organizational audits and compliance metrics. Case studies are used to illustrate course concepts.
BUS 5060Understanding Technology Used in an Open Access Environment (3)
Covers the technologies enabling the migration of computing applications, communications, and information to the cloud environment. Explores the technologies that facilitated back-end integration and front-end deployment. Reviews the information assurance challenges and popular solutions of cloud computing. Discusses communications concepts such as TCP/IP, ISP delivery channels, and wireless technology.
BUS 5100Cyber Law, Regulation, and Ethics (3)
An overview of the ethical challenges in the information age - introduces the complex and dynamic state of the law as it applies to behavior in cyberspace. Topics include the legal pitfalls of doing business in an interconnected world and an intro to the various organizations and materials that can be turned to for assistance in understanding how to ethically and legally provide services and operate modern computer-based systems and networks.
BUS 6000Applied Wireless Network Security (3)
Provides students with practical, real-world experience with the various wireless network security core competencies. Specifically, the course provides the most popular hacking, cracking, and wireless security network analysis tools on a CD ROM and trains students to use them to assess and secure wireless networks.