Skip to content

Cybersecurity Courses

Curriculum Details


You can complete this online program in as few as two years with full-time study or enroll part-time to learn on your schedule.

UD’s cybersecurity courses utilize the latest research in the field to bridge theory and problem-solving. Our program takes you beyond IT and prepares you to design and execute sophisticated solutions that protect global systems and infrastructure.

Core Courses

Introduction to computer and network security covers the foundation security policies and methods to provide confidentiality, integrity, and availability, as well as cryptography, auditing, and user security. Topics are reinforced with hands-on exercises run in a virtual machine environment.

This seminar course explores areas in advanced computer and network security not covered in introductory cybersecurity classes. Course provides insight into realistic complex defensive and offensive cybersecurity topics such as DoS attacks, DNS security, Email spam, On-line Authentication, Phishing, Cloud Security, Malware, and Web security.

Practical treatment of the defensive techniques used to harden computer systems to make them less vulnerable to cyber-attacks. Defect management, configuration/ hardening, account control, logs/auditing, and risk assessment are covered and reinforced with hands-on exercises run in a virtual machine environment.
Introduction to digital forensics as used to analyze criminal evidence in computer systems and digital media. Forensic tools and techniques for storage and memory analysis of windows/Linux, network traffic, and documentation are covered and reinforced with hands-on exercises run in a virtual machine environment.
This cybersecurity course introduces techniques used (1) to identify strengths and exploit weaknesses in networked systems or hosts, and (2) to reverse engineer programs of unknown origin and identify their function to classify them as malware and highlight the level of risk that they represent. Prerequisites: CPEG665. Programming experience in assembly language.
This cybersecurity course introduces the theory and practices used to help make a computer program secure and provides the skills needed to implement programs that are free from vulnerabilities. Prerequisites: Programming experience in a high level language (e.g., C, C++, java, python).
Foundation principles, architectures, and techniques employed in computer and communication networks. Focuses on mechanisms used in TCP/IP protocol suite. Topics include connection management, end-to-end reliable data transfer, sliding window protocols, quality of service, flow control, congestion control, routing, LANs, framing, error control, analog versus digital transmission, packet versus circuit switching, multiplexing. Prerequisites: An undergraduate level course in computer architecture and operating systems.
This cybersecurity course explores modern Cryptography covering algorithms and cryptosystems, cryptanalysis, and best practices for application and implementation of crypto in software systems. Prerequisites: CPEG665
With the increasing amount of textual information, it is important to develop effective search engines, such as Google, to help users manage and exploit the information. Examine the underlying technologies of search engines and get hands-on project experience. Requires good programming skills.
An examination and analysis of smart grid technologies, applications, and transformational impacts on the electric utilities. Topics cover smart grid fundamentals, objectives, technologies (power, communications and information), architectures, applications, evolution, and implementation challenges.

Request More Information

We’re here to answer your questions about admissions, financial aid, transfer credits and more. Fill out the form below to get in touch with a helpful admissions counselor.

All fields are required.