The Core is an opportunity to inquire into the fundamental aspects of being and our relationship with God, nature and our fellow human beings.
Popular Searches
The following courses are required for completion of the Master of Science in Cybersecurity.
The course introduces logic while giving students the opportunity to make arguments. The course will cover persuasion by defining and explaining what rhetoric is. The course also addresses the practice of social influence; marketing politics, interpersonal relationships, and groups. The course will teach students how to communicate effectively in business situations.
An intensive exploration of the intellectual and moral virtues in the context of cultivatingleadership characterized by magnanimity and humility and built on the cardinal virtues (i.e.,prudence, justice, self-control, and courage). Students develop an advanced capacity for self-awareness and managing oneself. Connections between ethical, authentic, servant, andtransformational leadership styles and virtues are examined and applied to personal leadership style and ethical decision making.
An examination of business as a creation of man and collective contributor to society according to its responsibilities articulated by the tenets of Catholic social teaching including the commongood, solidarity, subsidiarity, the dignity of the human person, worker, and work, and a preference for the poor. Emphasis is placed on how managers and their organizations effect change for a more sustainable planet and just society.
teaches students the art of problem-solving using software programming. Thecourse uses Python as its primary programming language. No prior programming experience isrequired. Topics include translating a problem from its real-world context to software, whileaddressing the requirements of modeling, abstraction, complexity, and security. The coursewill also cover software engineering principles and the use of AI tools, as well as programming for data-intensive applications. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).
This course covers the legal, ethical, strategic, and practical considerations of utilizing AI in a business context. Students can expect to gain a comprehensive understanding of how AI impacts various facets of business decision-making and operations, equipping them with the knowledge and skills necessary to navigate the evolving landscape of AI technology in the business world.
This course is designed to provide students with a broad overview of cybersecurity, starting with the concepts of confidentiality, integrity, and availability. Students will be introduced to problems in real-world security centered around specifications, implementation, performance, and human factors. Topics covered in this course focus on real-world security of systems, networks, and data by using material from the evolving threat landscape, cryptography and access control, security protocols and the role of human-computer interaction in cybersecurity. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).
This course provides a comprehensive exploration of cryptography, cryptanalysis, and advanced data protection techniques. Core topics include encryption, decryption, key management, dataanonymization methods, and emerging technologies such as AI-driven security andquantum-safe cryptography. Through hands-on labs and practical exercises, students will applyconcepts and develop strategies to addresses real-world scenarios. This course is included in the91¸£ÀûÉç National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).
Prerequisite:
This course examines the governance, risk, privacy and compliance frameworks within whichorganizations operate. Students will develop an understanding of the complexities of governance,risk and compliance starting with a general foundation of laws, standards and risks that applyacross most organizations. The course also examines how security, compliance, and privacy obligations can be used to establish an organization’s risk management program. The focus of privacy within this course will be important to privacy professionals with an interest in gaining privacy certifications including the Certified Information Privacy Professional (CIPP) and others. This course is included in the University of Dallas’s NSA National Centers of Academic Excellence designation as CAE-Cyber Defense (CAE-CD).
Corequisite:
The Identity and Access Management (IAM) Strategies course will focus on developing students’ knowledge, skills and competencies by examining IAM principles, the NIST cybersecurity framework, and numerous controls/technologies. By studying cyber breach cases and vulnerabilities students will design IAM policies, controls and strategies to protect organizational assets. This course is included in the 91¸£ÀûÉç National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).
This course delves into the foundational and advanced concepts of network security architectures, cloud computing, devices, and protocols with a focus on Zero Trust Network Architecture (ZTNA). Through hands-on labs and presentations, participants will address real-world scenarios, gaining the skills needed to design and implement secure, scalable, and resilient network architectures preparing them for the Certified Network Defender (C|ND) certification. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).
Prerequisites:
This advanced course provides an in-depth understanding of penetration (pen) testing and vulnerability analysis by cultivating the mindset of an ethical penetration tester. This lab-based course will prepare students for the Certified Ethical Hacker Certification (C|EH). Topics coveredinclude reconnaissance, identification and exploitation of vulnerabilities, post-exploitation exercises, and development of mitigation strategies. This course is included in the 91¸£ÀûÉç National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).
This course is taken in the last semester and is designed to integrate all earlier coursework. Thiscourse examines Cybersecurity at a program level by developing strategy that includes components including mission, values, organizational structure, network structure, policy, risk assessment, vulnerability management, metrics, business continuity, disaster recovery, awareness, education, culture, staffing, and threat analysis. Students will develop four major projects and present the final project to a cybersecurity professional for review, recommendation and evaluation. This course is only open to MS students in Cybersecurity. Approval is required to enroll. This course is included in the University of Dallas National Center of Academic Excellence in Cybersecurity designation as CAE-Cyber Defense (CAE-CD).