Cybersecurity Courses and Education

Mission Statement

Rose State College’s mission is dedicated to building our Cybersecurity program curriculum to provide advice, research, and training helping deter cyber incidents and assist in fighting cyber crimes.

Rose State College’s Cybersecurity program offers training to community college faculty, secondary school faculty, and students across Oklahoma and neighboring states. The following includes established goals:

  • Development and implementation of an Associate of Applied Science (AAS) degree in Cybersecurity and Digital Forensics.
  • Internship program for students in the Cybersecurity AAS degree program specializing in Information Assurance and Digital Forensics.
  • A scholarship program supporting students from underrepresented groups in the IT professions.
  • A scholarship program supporting students seeking vendor specific certification. (CompTia, Cisco, Microsoft, ISC).
  • Offer opportunities for two-year, four-year and high school faculty from neighboring states to attend train the trainer workshops.

Cybersecurity Courses

CIT 2323 Security+ Certification Preparation

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

The student will learn the fundamentals of network security. Students will study security design and development.

The student will learn the fundamentals of network security. Students will study security design and development. The proper use of access control lists, firewalls, VPNs, and Intrusion Detection Systems.

Major Topics: Upon completion of Network Security, the student will be able to: 
1. Demonstrate a basic knowledge of Network Security. 
2. Demonstrate the ability to design and implement a secure network. 
3. Demonstrate the ability to analyze and assess security breaches. 
4. Auditing collections, tools and reporting. Peripheral Devices / Security Peripherals 
5. Analyze business and security requirements for the end user 
6. Design a security baseline 
7. Configure security policies 
8. Guards / cdsec / VPNs / Firewalls 
9. Designing an IPsec Solution 
10. Understand the security issues and limitations associated with accessing public and private networks 
11. Implementing connectivity to a VPN 
12. Routers / Switches / Gateways 
13. IDSes, IPSes 
14. Different Encryption methods – pros and cons 
15. Demonstrate a basic knowledge of asynchronous vs. Synchronous 
16. Demonstrate ability to use network mapping tools 
17. Demonstrate ability to use network analysis tools 
18. Identify and fingerprint various different network protocols 
19. Analyze security requirements 
20. Design a security solution 
21. Adversaries and Threats 
22. Motivations and Threats to system 
23. Design a security solution 
24. Create solutions for user distribution and resource distribution 
25. Analyze network roles and responsibilities 
26. Network Storage Devices 
27. Mobile Devices

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. 

Grades for the course will be based on the following: 
Two Examinations 45% 
Homework 20% 
Individual Projects 20% 
Analyzing network traffic 
Fingerprinting – Identifying network protocols 
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2563 Cryptography and Trusted Systems

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Students will be introduced to security problems in computer, basic encryption and decryption techniques. Secure encryption systems and cryptographic protocols and practices will also be presented.

Course Learning Objective: An understanding of basic concepts of computer security. Emphasis on encryption and decryption, and cryptographic protocols and practices.

Major Topics Covered: Upon completion of Computer Security the student will be able to:
1. Define components of an information system 
2. Describe the security investigation phase 
3. Assess security analysis 
4. Describe logical design 
5. Describe physical design 
6. Analyze physical security 
7. Describe implementing security 
8. Describe maintenance and change 
9. Describe the history of information security 
10. Identify components of an information system 
11. Describe the systems development life cycle 
12. Describe the security systems development life cycle 
13. Describe the need for security 
14. Differentiate threat types 
15. Describe attack types 
16. Describe law and ethics in information security 
17. Describe certifications and professional organizations 
18. Analyze risk management 
19. Describe risk identification 
20. Evaluate risk assessment 
21. Identify risk control strategies 
22. Identify information security policy, standards and practices. 
23. Evaluate information security blueprints. 
24. Describe security education, training and awareness. 
25. Describe planning for continuity 
26. Evaluate disaster recovery planning. 
27. Describe law enforcement involvement. 
28. Identify firewalls 
29. Evaluate intrusion detection systems 
30. Identify analysis tools 
31. Describe cryptography and encryption based solutions 
32. Identify protocols for secure communications 
33. Describe interception of data 
34. Describe project planning 
35. Evaluate staffing needs 
36. Describe credentials of information security professionals 
37. Identify the iso network management model 
38. Evaluate planning and risk assessment 
39. Describe vulnerability assessment 
40. Describe monitoring external and internal environments 
41. Describe access controls, abac, mac, dac, lbac, rba 
42. Describe cnss security mode 
43. Describe the payment card industry data security standard 
44. Describe auditing 
45. Describe worksheets charts graphing spreadsheet function using excel

Method of Instruction: Lectures, class discussion, Hands on training in a computer lab environment, Case projects, Classroom tests covering the textbook and training exercises.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the following scale: Semester scores will be equated to grades as follows 
A 90-100 
B 80-89 
C 70-79 
D 60-69 
F 0-59

Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 1533 Principles of Cyber Security

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

The students will be introduced to a broad scope of information assurance principles and concepts that will build a strong foundation for later courses.

Course Learning Objective: An understanding of basic concepts of computer security. Emphasis on encryption and decryption, and cryptographic protocols and practices.

Major Topics Covered: Upon completion of Computer Security the student will be able to:
1. Define components of an information system 
2. Describe the security investigation phase 
3. Assess security analysis 
4. Describe logical design 
5. Describe physical design 
6. Analyze physical security 
7. Describe implementing security 
8. Describe maintenance and change 
9. Describe the history of information security 
10. Identify components of an information system 
11. Describe the systems development life cycle 
12. Describe the security systems development life cycle 
13. Describe the need for security 
14. Differentiate threat types 
15. Describe attack types 
16. Describe law and ethics in information security 
17. Describe certifications and professional organizations 
18. Analyze risk management 
19. Describe risk identification 
20. Evaluate risk assessment 
21. Identify risk control strategies 
22. Identify information security policy, standards and practices. 
23. Evaluate information security blueprints. 
24. Describe security education, training and awareness. 
25. Describe planning for continuity 
26. Evaluate disaster recovery planning. 
27. Describe law enforcement involvement. 
28. Identify firewalls 
29. Evaluate intrusion detection systems 
30. Identify analysis tools 
31. Describe cryptography and encryption based solutions 
32. Identify protocols for secure communications 
33. Describe interception of data 
34. Describe project planning 
35. Evaluate staffing needs 
36. Describe credentials of information security professionals 
37. Identify the iso network management model 
38. Evaluate planning and risk assessment 
39. Describe vulnerability assessment 
40. Describe monitoring external and internal environments 
41. Describe access controls, abac, mac, dac, lbac, rba 
42. Describe cnss security mode 
43. Describe the payment card industry data security standard 
44. Describe auditing 
45. Describe worksheets charts graphing spreadsheet function using excel

Method of Instruction: Lectures, class discussion, Hands on training in a computer lab environment, Case projects, Classroom tests covering the textbook and training exercises.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the following scale: Semester scores will be equated to grades as follows 
A 90-100 
B 80-89 
C 70-79 
D 60-69 
F 0-59

Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 1203 Script Programming

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

The student will learn the basics of scripting. Students will be introduced to Python, JavaScript, CGI/Perl, PHP, VBScript and Windows Script Host. Students will also learn the art of web page interaction and data manipulation.

Course Prerequisites: CIT 1613

Course Learning Objective: An understanding of basic concepts of script programming logic, syntax, coding style, error handling and programmatic structures.

Major Topics Covered: Upon completion of Computer Security the student will be able to:
1. Design and manipulate data with JavaScript. 
2. Describe and define the basics of java scripting. 
3. Demonstrate CGI/Perl by creating an interactive web form 
4. Create portable Perl scripts 
5. Explain basic Perl functionality with packages and loadable modules 
6. Demonstrate passing user data to a Perl script and returning to web page. 
7. Create email forms using CGI 
8. Interactively create JavaScript and view it on a web site 
9. Demonstrate the process of passing data via CGI 
10. Describe dynamic content that interacts with a database 
11. Create web based software application 
12. Define visual basic applications (VBA)utilizing Microsoft excel and other Microsoft applications 
13. Demonstrate a knowledge of vbscript by creating a host application 
14. Create an interactive web form 
15. Define language independent 
16. Create a script using the wscript object 
17. Demonstrate the use of wscript.network object 
18. Demonstrate wscript.shell object 
19. Introduction to python numeric data types 
20. Show examples of simple programs 
21. Introduction to loops and simple functions 
22. Introduction to turtle graphics 
23. Provide an overview of common problem solving strategies 
24. Understanding numeric expressions, variables, and assignment 
25. Utilization of match functions 
26. Simple selection statements 
27. Random number generation 
28. Boolean logic and expressions 
29. String data types 
30. String methods and operators 
31. Simple cryptographic algorithms 
32. Apply an introductory level of knowledge using CGI/Perl 
33. Describe PHP basics for developing web based software applications 
34. Describe vbscript and how it performs automated functions 
35. Explain the use for windows script host 
36. Describe encapsulation 
37. Describe isolation as pertaining to programming 
38. Create programs using least astonishment of both interface and code 
39. Program using the principle of usability as pertaining to the user interface

Method of Instruction: Lectures, Class discussions, Classroom exercises, Software demonstrations, Online tutorials

Course Assessment: The final grade will be based on the following scale: 
A 90-100 
B 80-89 
C 70-79 
D 60-69 
F 0-59 

The basic means of evaluation will be on one or more exams, and four or more hands-on projects.

CIT 2533 Ethics in Information Technology

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1 times the amount of contact hours for an additional 40 hours bringing the estimated total class hours to 80.

This course will be a study of legal issues, applicable court decisions, federal and state statutes, administrative rulings, legal literature, and ethical considerations relating to Internet law.

Course Prerequisites: None

Course Learning Objectives: The student will learn the fundamentals of Law as it pertains to the Internet and the Cyber Environment. Ethics is also discussed in great detail. Students will be presented with and evaluate current and past case students to determine the impact on today’s world.

Major Topics: Upon completion of Cyber Law, the student will be able to: 
1. Describe e-business and cyber law 
2. Evaluate property issues in cyberspace 
3. Describe jurisdiction 
4. Identify cyber law 
5. Identify copyrights 
6. Describe business method patents 
7. Analyze online contracting and licensing agreements 
8. Define trademarks 
9. Describe business issues in cyberspace 
10. Identify internet and computer crime

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following: 
Two Examinations 45% 
Individual Projects 30% 
Attendance / Participation 25%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 1503 Network+ Certification Preparation

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Introduction to Networks is an introductory course which covers the fundamental hardware and software concepts involved in a basic network. The standard open systems interconnect model, popular LAN topologies and network administration will be discussed.

Major Topics: Upon completion of Network Administration I the student will be introduced to: 
1. Describe the fundamental components of a network 
2. Identify and understand the responsibilities of a network administrator 
3. Identify the various kinds of network topologies 
4. Identify the essential elements of a local area network 
5. Describe the purposes of the open systems interconnect model 
6. Describe how local area networks are used and the various types of applications are utilized on a LAN 
7. Identify the various types of media used on a LAN 
8. Discuss LAN topologies and standards 
9. Identify various hardware devices used on a LAN such as servers, workstations, hubs, printers, etc. 
10. Describe the generic functions of LAN system software 
11. Discuss software requirements and standards 
12. Describe the specific functions of server and workstation software 
13. Discuss the unique characteristics of various network operating systems 
14. Identify the administrative details of installing local area networks 
15. Describe the requirements for setting up users, groups, and security 
16. Describe a LAN printing environment 
17. List the requirements involved in establishing LAN security and backup

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: Competency will be measured through the use of multiple assignments and multiple exams 
35% Lab Assignment, 65% Exams 
A 90-100 
B 80-89 
C 70-79 
D 60-69 
F 0-59

CIT 2053 Network Administration

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

An introductory course in the installation and use of a local area network. After installing the hardware and network software, the student will then utilize various application programs on the network. Network terminology, security, and management issues will be studied.

Major Topics: Upon completion of Network Administration I the student will be introduced to: 
1. Differentiate between server and client 
2. Install server and client software 
3. Configure and manage drivers and driver signing 
4. Restore and backup system and user data 
5. Configure and manage user profiles and desktop settings 
6. Configure and manage Internet Information Services (IIS) 
7. Configure and manage local and group user accounts 
8. Configure file system permissions 
9. Monitor and optimize server performance 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2553 Digital Forensics

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Students will gain practical knowledge on how to conduct digital investigations and preserve evidence that stands up to inquiries.

Course Prerequisites: CIT 1533

Course Learning Objective: An understanding of basic concepts of Digital Forensics.

Major Topics Covered: Upon completion of Digital Forensics the student will be able to:

  1. describe computer forensics
  2. identify file systems.
  3. describe data recovery.
  4. examine data structures.
  5. evaluate computer forensics software
  6. identify digital evidence
  7. evaluate data-hiding techniques
  8. identify image files
  9. describe investigation reporting
  10. describe computer forensics
  11. identify file systems.
  12. describe data recovery.
  13. examine data structures.
  14. evaluate computer forensics software
  15. identify digital evidence
  16. evaluate data-hiding techniques
  17. identify image files
  18. describe investigation reporting
  19. identify digital evidence
  20. evaluate data-hiding techniques
  21. identify image files
  22. describe investigation reporting
  23. identify file systems
  24. differentiate operating system’s disk structure
  25. describe operating system’s boot processes
  26. analyze computer forensics software
  27. evaluate computer forensics software needs
  28. describe the use of command-line forensic tools
  29. identify computer forensics hardware
  30. identify digital evidence.
  31. evaluate digital signatures
  32. describe cataloging and storing digital evidence
  33. describe securing a computer incident or crime scene
  34. define data acquisition
  35. identify the best acquisition method
  36. differentiate data acquisition tools
  37. define computer forensic analysis
  38. identify digital intelligence computer forensics tools
  39. describe data-hiding techniques
  40. describe Internet fundamentals
  41. identify e-mail crimes and violations
  42. differentiate specialized e-mail computer forensics tools
  43. define image files
  44. describe data compression
  45. identify image file headers
  46. identify copyright issues with graphics
  47. describe the importance of reports
  48. define procedural and evidence rule requirements
  49. identify types of reports
  50. demonstrate documenting a report

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following: 
Discussions: 10%
Two Examinations 30% 
Lab Assignments 60% 


These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2603 Ethical hacking and Systems Defense

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

This class covers best computer-security practices and industry standards to deter attacks and better defend networks.

Course Prerequisites: CIT 1533

Course Learning Objective: An understanding of basic concepts of Ethical Hacking and Systems Defense

Major Topics Covered: Upon completion of Information Security Management, the student will be able to:

  1. describe and utilize Security Auditing and Penetration Testing tools.
  2. recognize and discuss HIPAA Security Regulations.
  3. differentiate virus outbreaks.
  4. recognize Cyber Extortion
  5. explain network architecture,
  6. differentiate port scanners,
  7. discuss and explain incident reconstruction,
  8. diagram the discovery.
  9. explain wireless approaches,
  10. describe and recognize existing security,
  11. differentiate virus outbreaks,
  12. design an assessment process.
  13. create a pilot test
  14. create and maintain policies
  15. define industrial espionage
  16. discuss executive fraud
  17. discuss cyber extortion
  18. analyze wireless traffic
  19. Metasploit Framework
  20. Armitage 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following: 
Discussions: 10%
Two Examinations 30% 
Lab Assignments 50% 
Attendance 10%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2523 Information Security Management

This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

This course examines managerial aspects of computer security and risk management for enterprises. The student will acquire information for accreditation, procurement, extension and operation principles for secure computing systems.

Course Prerequisites: CIT 1533

Course Learning Objective: An understanding of basic concepts of Information Management, Risk Management, and the managerial aspects of computer security

Major Topics Covered: Upon completion of Information Security Management, the student will be able to:

  1. Evaluate contingency planning
  2. Describe information policies
  3. Describe information security practices
  4. Identify information security management models
  5. Explain, identifying, assessing and controlling risk
  6. Evaluate information security protection mechanisms
  7. Evaluate Computer Emergency Response Teams

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following: 
Discussions: 20%
Two Examinations 50% 
Homework 30% 

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.