{"id":44,"date":"2025-10-08T16:49:45","date_gmt":"2025-10-08T20:49:45","guid":{"rendered":"https:\/\/sites.bsu.edu\/cadse\/?page_id=44"},"modified":"2025-11-12T21:50:13","modified_gmt":"2025-11-13T02:50:13","slug":"courses","status":"publish","type":"page","link":"https:\/\/sites.bsu.edu\/cadse\/courses\/","title":{"rendered":"Courses"},"content":{"rendered":"<p><span style=\"font-size: 30px;color: #54585a\">Courses<\/span><\/p>\n<p>The Computer Science department offers a variety of cybersecurity courses to support various majors and minors. These courses range from introductory computer security courses to advanced cryptography and Secure DevOps courses. The forensics courses also prepare students to complete <a href=\"https:\/\/www.magnetforensics.com\/\" target=\"_blank\" rel=\"noopener\">Magnet Forensics&#8217;<\/a> Magnet Certified Forensic Examiner certification.<\/p>\n<hr \/>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 203 Introduction to Computer Security<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">Introduction to network infrastructure, security threats, organization of file systems, encryption and decryption algorithms, authentication algorithms, programming and deployment of firewalls, intrusion detection systems, and virtual private networks, forensics, malicious software, and system administration.<\/p>\n<\/div>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 249 Forensics<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">Introduction to digital forensics as applied to gathering evidence of inappropriate behavior on a computer. Includes an examination of prominent file system architectures and search algorithm techniques, physical characteristics of magnetic media, secure deletion methodologies, and cryptology.<\/p>\n<\/div>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 250 Mobile Forensics<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">Introduction to forensic examination of mobile devices; topics include file system and network analysis, data acquisition, device and location investigation, communication of findings, and ethical considerations.<\/p>\n<\/div>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 322 Secure Software Development<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">This course covers the important factors considered in the design and testing of software, from the security perspective. Topics include: principles of secure design, defensive programming, secure software engineering, and an introduction to web security. Students will learn to develop and test secure software through hands-on lab exercises and programming assignments.<\/p>\n<\/div>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 447 Computer, Information, and Network Security<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">Provides critical knowledge and skills for the highly connected, data rich, secure environment. Topics include encryption, decryption, protocols, viruses, network security, authentication, legal and ethical issues, and security in operating systems, databases, e-commerce, Internet, and wireless.\u202f Algorithms, protocols and applications such as RSA, DES, SSL, Firewalls, Digital Signatures, VPNs and emerging topics will be explored.<\/p>\n<\/div>\n<div style=\"background: #fff;border: 1px solid #ddd;border-radius: 8px;padding: 16px 20px;margin-bottom: 16px\">\n<h2 style=\"margin: 0;color: #222;font-size: 1.2em\">CS 448 Secure DevOps<\/h2>\n<p style=\"margin-top: 8px;line-height: 1.5\">Explores the integration of security principles and practices into the DevOps lifecycle. Topics include mitigation of security risks in continuous integration, continuous delivery (CI\/CD) pipelines, software development processes, threat modeling, code analysis, vulnerability management, and security automation tools.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Courses The Computer Science department offers a variety of cybersecurity courses to support various majors and minors. These courses range from introductory computer security courses to advanced cryptography and Secure DevOps courses. The forensics courses also prepare students to complete Magnet Forensics&#8217; Magnet Certified Forensic Examiner certification. CS 203 Introduction to Computer Security Introduction to [&hellip;]<\/p>\n","protected":false},"author":1108,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-page\/page-full-width.php","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Courses - Cardinal Academy of Digital Security and Education<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sites.bsu.edu\/cadse\/courses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Courses - Cardinal Academy of Digital Security and Education\" \/>\n<meta property=\"og:description\" content=\"Courses The Computer Science department offers a variety of cybersecurity courses to support various majors and minors. These courses range from introductory computer security courses to advanced cryptography and Secure DevOps courses. The forensics courses also prepare students to complete Magnet Forensics&#8217; Magnet Certified Forensic Examiner certification. CS 203 Introduction to Computer Security Introduction to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sites.bsu.edu\/cadse\/courses\/\" \/>\n<meta property=\"og:site_name\" content=\"Cardinal Academy of Digital Security and Education\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-13T02:50:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sites.bsu.edu\/cadse\/courses\/\",\"url\":\"https:\/\/sites.bsu.edu\/cadse\/courses\/\",\"name\":\"Courses - Cardinal Academy of Digital Security and Education\",\"isPartOf\":{\"@id\":\"https:\/\/sites.bsu.edu\/cadse\/#website\"},\"datePublished\":\"2025-10-08T20:49:45+00:00\",\"dateModified\":\"2025-11-13T02:50:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sites.bsu.edu\/cadse\/courses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sites.bsu.edu\/cadse\/courses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sites.bsu.edu\/cadse\/courses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sites.bsu.edu\/cadse\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sites.bsu.edu\/cadse\/#website\",\"url\":\"https:\/\/sites.bsu.edu\/cadse\/\",\"name\":\"Cardinal Academy of Digital Security and Education\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sites.bsu.edu\/cadse\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Courses - Cardinal Academy of Digital Security and Education","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sites.bsu.edu\/cadse\/courses\/","og_locale":"en_US","og_type":"article","og_title":"Courses - Cardinal Academy of Digital Security and Education","og_description":"Courses The Computer Science department offers a variety of cybersecurity courses to support various majors and minors. These courses range from introductory computer security courses to advanced cryptography and Secure DevOps courses. The forensics courses also prepare students to complete Magnet Forensics&#8217; Magnet Certified Forensic Examiner certification. CS 203 Introduction to Computer Security Introduction to [&hellip;]","og_url":"https:\/\/sites.bsu.edu\/cadse\/courses\/","og_site_name":"Cardinal Academy of Digital Security and Education","article_modified_time":"2025-11-13T02:50:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sites.bsu.edu\/cadse\/courses\/","url":"https:\/\/sites.bsu.edu\/cadse\/courses\/","name":"Courses - Cardinal Academy of Digital Security and Education","isPartOf":{"@id":"https:\/\/sites.bsu.edu\/cadse\/#website"},"datePublished":"2025-10-08T20:49:45+00:00","dateModified":"2025-11-13T02:50:13+00:00","breadcrumb":{"@id":"https:\/\/sites.bsu.edu\/cadse\/courses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sites.bsu.edu\/cadse\/courses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sites.bsu.edu\/cadse\/courses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sites.bsu.edu\/cadse\/"},{"@type":"ListItem","position":2,"name":"Courses"}]},{"@type":"WebSite","@id":"https:\/\/sites.bsu.edu\/cadse\/#website","url":"https:\/\/sites.bsu.edu\/cadse\/","name":"Cardinal Academy of Digital Security and Education","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sites.bsu.edu\/cadse\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/users\/1108"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":0,"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.bsu.edu\/cadse\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}