CYBERSECURITY.

Seal_of_the_United_States_Department_of_Homeland_Security.svg_
CNSS_Logo 2

WE DELIVER VALUE

The Yeshiva of Newark offers a superior educational experience by partnering with IDT, Bellevue University, and YIEP, allowing us to provide state-of-the-art courses combining the best of online and in-person classroom experiences.

Bellevue University offers excellent courses and the National Security Agency, and the Department of Homeland Security have designated Bellevue University as a National Center of Academic Excellence in Information Assurance/Cybersecurity. Moreover, YIEP works with the University to ensure that the courses meet our Yeshiva standards and never conflict with Shabbos or Yom Tov.

When it comes to CyberSecurity, book learning provides only a fraction of the necessary skills required for top jobs in the field. Our partnership with IDT catapults us well beyond similar programs at highly respected universities by offering exclusive lectures and workshops by leading industry professionals, internships for direct application of theory to real-world situations, and job placement opportunities.

OUR PROCESS.

Click each icon to read about the steps in our two-year intensive educational experience.

Yeshiva of Newark

Start your day with a fantastic lineup of fully accredited Shiurim by world class Rabbeim. Are you a masmid? Bring your chavrusa along and get credits for your hasmodah.

Bellevue University

Bellevue Universities state of the art online courses are augmented by our group learning environment complete with an available CyberSecurity “Shoel u’Meishiv.”

Internships

IDT’s CyberSecurity team wants to put you to work as an Intern. You get hands on experience while they get more eyes on the security situation; it’s “zeh nehneh v’zeh nehneh” at its best.

B. S. in Cybersecurity

After two years of intensive study, your Limudei Kodesh courses, Bellevue courses, and some additional required courses that you will take will add up to a full Bachelors of Science in Cyber Security.

Job Placement

IDT has relationships with many companies throughout the tech industry. All of them need CyberSecurity personnel they can trust. Work hard for two years, show us a great work ethic, and we will work just as hard on getting you a great job.

DEGREE INFORMATION.

Degree Overview

The field of cybersecurity is evolving rapidly as new risks and threats emerge. The Bellevue University Bachelor of Science in Cybersecurity offers an inclusive education in the theory and application of technical and non-technical security skills. The degree covers the relevant knowledge and skills to apply protection, detection, response technologies, and procedures. You will learn to apply them in various cyber security environments where you need to identify threats, vulnerabilities, exploits, and controls. Integrating hands-on, applied learning with theory, all Bellevue University degrees are designed to deliver a transformative learning experience that is flexible to accommodate your personal and work life.

Performance Outcomes

The online Cyber Security degree emphasizes identifying, analyzing, mitigating, and communicating risks to cyber systems using various tools, techniques, and technologies. This degree will prepare you to:

  • Evaluate fundamental cybersecurity concepts, theories, and strategies as they apply to real world case studies.
  • Explain technical and non-technical security solutions on different types of cyber systems.
  • Apply cyber incident response project plans.
  • Assess risks, vulnerabilities, and threats to sample cyber systems.
  • Identify attributes associated with cybersecurity professionals.

Major Requirements:  (36 credit hours)

Degree Specifics

The BS-Cybersecurity program is an inclusive education in the theory and application of technical and non-technical security skills. The program covers an array of abilities required by the quickly evolving cybersecurity industry. These skills include applying protection, detection, and response technologies and procedures to identify threats, vulnerabilities, exploits, and controls in various cyber environments. Emphasis is placed on identifying, analyzing, mitigating and communicating risks to cyber systems using various tools, techniques, and technologies.

Course Descriptions

  • CYBR 250 – Introduction to Cyber Threats, Technologies and Security (3 Credits)

This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections.

  • CIS 313 – Cryptography (3 Credits)

This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer.

  • CIS 311 – Network Security (3 Credits)

This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.

  • CIS 312 – Securing Access Control (3 Credits)

This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.

  • CIS 411 – Assessments and Audits (3 Credits)

This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.

  • CYBR 320 – Operational Security (3 Credits)

This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.

  • CYBR 340 – Operating Systems and Mobile Device Security (3 Credits)

This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers.

  • CYBR 350 – Web, Commerce and Application Security (3 Credits)

This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.

  • CYBR 410 – Data/Database Security (3 Credits)

This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data – whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security.

  • CYBR 420 – Cyber Investigations and Forensics (3 Credits)

This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.

  • CYBR 450 – Advanced Cybersecurity Concepts (3 Credits)

This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.

  • CYBR 430 – Penetration Testing and Incident Response (3 Credits)

This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures.