The campus will remain closed until 12 noon Thursday, 02/13/25. Students should log into Canvas for specific class information from their instructors. Please contact event organizers for information on specific activities. Normal operations will resume at 12pm on Thursday.
Cyber threats are becoming more sophisticated, and organizations everywhere are searching for experts who can safeguard their critical systems and data. LTU’s Graduate Certificate in Cybersecurity provides you with the knowledge and skills to tackle these challenges.
You can take this 15-credit-hour program independently or as part of Master of Business Administration (MBA) or Master of Science in Information Technology (MSIT) programs.
Course Name
Course #
Credits
This course introduces students to the strategic and operational uses of information systems. The use of information systems is examined for achieving and maintaining competitive advantage, as well as managerial issues concerning the development, implementation, and management of enterprise information systems. Case studies address the impact of information systems on the organization, the challenges involved in managing technological change in organizations, and the impact of emerging technologies. Students will develop a socio-technical perspective on the use of information systems to solve real-world problems.
INT6043
3
Course Name
Course #
Credits
This course provides an in-depth study of the fundamental concepts and principles in communications and computer networking. The course examines the technical, design, and management issues related to enterprise computer networking. Students will have deep knowledge and understanding of networking concepts, protocols design, and popular network technologies. Topics covered include network design and architectures, telecommunications and networking standards, approaches to scaling services, virtualization, redundancy, network security and management, data center design, hosting and cloud services, and emerging technologies and trends. The course also covers server architectures, cluster computing, grid computing, storage area networks and network attached storage, and data center design and implementation.
INT6143
3
As networks continue to grow and as computing becomes more and more ubiquitous, today’s IT Managers need to have a thorough understanding of security and the risks associated when inappropriate security exists. Students will explore basic security concepts, principles and strategy, how to develop and manage IT security program and how to strategize and plan an IT architecture. Students will also discuss other IT security issues as it relates to current market trends.
INT7223
3
This course will teach students legal and ethical issues related to the collection, analysis, preservation, and transmission of digital data. Students will
understand computer crime laws and analyze key legal cases related to cybercrimes. The course will examine the dynamic nature of the cyberspace, the impact of emerging technologies, and the legal and constitutional guidelines surrounding the use of those technologies within the cyberspace. The course will explore best practices and policies for protecting confidential and private information.
INT7233
3
Many organizations that encounter an unplanned outage can tolerate only a short amount of downtime before they experience a significant revenue loss or other adverse business impact. In the event of a security breach or natural disaster that halts day-to-day operations, organizations need to recover as quickly as possible. Not having a disaster recovery plan in place can put the organization at risk of significant financial costs, reputation loss, and unintended consequences to customers. This course prepares students to lead an organization’s disaster recovery and business continuity program development. Students will learn how to develop, implement, and evaluate a disaster recovery and business continuity program based on established industry standards. Program components include risk assessment, incident response, technical recovery, crisis management, work area recovery, and pandemic plans. Student will learn how to mitigate risk and protect vital data and physical assets. This course will cover all the subject areas specified for the EC-Council Disaster Recovery Professional (EDRP) Certification.
INT7243
3
This course teaches students how to identify, analyze, and understand the impact of vulnerabilities in systems, networks, and applications in order to
prevent hackers from exploiting those vulnerabilities. Through hands-on lab activities, students will learn how to perform effective penetration tests using advanced techniques, tools, and methodology that hackers utilize to attack and compromise home and corporate network environments.
INT7263
3
Use Your Cell Phone as a Document Camera in Zoom
From Computer
Log in and start your Zoom session with participants
From Phone
To use your cell phone as a makeshift document camera