Cyber Security Program

(formerly Information Security Program)

Todd A. Whittaker, Program Chair

When a data network or computer system is exposed or exploited, the result can be catastrophic to both business and industry. That's why information security has grown into its own field - one that provides critical protection of information assets from unauthorized disclosure or modification, and accidental or intentional loss of data.

Courses in this curriculum include risk management and compliance; security architecture and controls; business continuity and operations; and network and application security. At Franklin University, students will learn about the typical development mistakes that lead to application-level security issues, including CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization, as well as how to defend against them.

This program also teaches design and implementation of highavailability systems through storage redundancy, load balancing, virtualization clusters, and disaster recovery systems. Students will have the opportunity to learn how security requirements and activities, such as risk identification, threat modeling, security testing, and monitoring, fit into the overall systems development lifecycle (SDLC).


CoF

The Cyber Security program has been selected to offer the prestigious Choose Ohio First Scholarship which is funded jointly by the Ohio Department of Higher Education and Franklin University. The Choose Ohio First Scholarship Program awards Ohio colleges, universities and their business partners that have developed innovative academic programs to recruit and retain more Ohio students into STEMM fields. The funding that they receive is used to offer scholarships for those programs to current and potential students. The award is for between $2,500 - $6,325 annually divided over two trimesters each year.


Graduates of the Cyber Security major wil:

Students in the Computer and Information Sciences Majors are expected to exceed the University's General Technology Requirements, and may be required to purchase hardware and/or software with capabilities greater than the standard technology requirements. There will be software requirements such as software development environments, operating systems, virtualization environments and tools, website development and business process documentation tools that will be used in various courses. Students should be prepared to invest in this software, and be able to install and uninstall it without assistance.

Students should check the Technology Requirements section of the Academic Bulletin and/or the Course Schedule for the requirements relevant for Computer and Information Sciences majors to ensure they have, and are familiar with, the requisite hardware and software. Courses with specific hardware and software requirements are detailed in the course syllabus under the "Required Materials" section.