What is penetration testing?
BYU's Cybersecurity Program offers a complete curriculum encompassing Penetration Testing & Ethical Hacking. Students will learn how to ethically discover vulnerabilities in systems in order to best protect those systems. These courses cover the three basic principles of Cybersecurity: Prepare, Defend and Act. All emphasis courses are available to Computer Science, Information Systems and other engineering students who have completed the necessary pre-requisites.
- Technical problem solving and trouble shooting
- Network design and implementation
- Technical writing and documentation
- Project management
- Ethical hacking
- Network security
IT & Cybersecurity
IT&C 492R - Special Problems in Information Technology & Cybersecurity
Individual study in current topics of information technology and/or cybersecurity. Learn more here.
IT&C 515R - Special Topics in Information Technology & Cybersecurity
New topics in information technology for graduate and undergraduate students. Standard lecture and lab format. Learn more here.
IT&C 529 - Advanced Networking
Analyzing, selecting, configuring, monitoring, and managing of computer network equipment. SNMP-based monitoring and control in process of fault isolation and root cause analysis. Learn more here.
IT&C 544 - System Administration
Systems and network administration. User management. Server and workstation deployment and maintenance. Network Security. Infrastructure. Systems and infrastructure support. Cross-platform systems integration. Update and patch management. Mobile workforce services. Learn more here.
IT&C 548 - Cyber-Physical Systems
Integration of technologies to develop computers and mobile devices that interact with the real world, including control and sensor interfaces. Incorporate IT core topics such as networks, security, and user-space experience design. Analysis and creation of cyber-physical and Internet-of-Things (IoT) systems. Learn more here.
IT&C 567 - Cybersecurity and Penetration Testing
Advanced computer systems security. Vulnerabilities and exploits. System and network attacks. Ethical hacking and penetration testing. Cybersecurity, cyber weapons, and advanced persistent threats. Legal and regulatory requirements for security and privacy. Learn more here.