Program Codes:
BSCYBSC
Bachelor of Science
Mission Statement
Welcome to the Cybersecurity program at Mercyhurst University. Our mission is to cultivate the next generation of cybersecurity professionals who possess the knowledge, skills, and ethical mindset necessary to safeguard individuals, organizations, and society from evolving cyber threats. Through comprehensive education, rigorous research, and collaborative partnerships, we aim to address the ever-increasing challenges in the digital realm and promote a secure and resilient cyber ecosystem. Our department is committed to providing a robust curriculum that combines theoretical foundations with hands-on practical experience. We strive to equip our students with a deep understanding of cybersecurity principles, risk management strategies, ethical hacking and cutting-edge technologies. By fostering a culture of innovation, critical thinking, and ethical decision-making, we empower our graduates to proactively detect, analyze, and mitigate cyber threats, ensuring the confidentiality, integrity, and availability of digital assets. As an integral part of the global cybersecurity community, we actively engage in interdisciplinary collaborations and knowledge sharing to stay at the forefront of the rapidly evolving cybersecurity landscape. Join us in our mission to defend the digital world and shape a secure future for all.
Majors and Minors
Majors: Cyber Security and Data Science
Minors: Computer Science, Cyber Security, and Data Science
This course introduces to fundamental concepts in computer science. Topics include: problem solving, algorithm development, computer programming in a high level language, debugging programs, abstract data types, variables, assignment, loops, conditionals, functions. Students who have successfully completed MATH 146 should not take this course.
This course introduces students to concepts in cyber security including: fundamentals of secure policy design: least privilege, fail-safe defaults, separation, minimize trust, economy of mechanism, minimize common mechanism, least astonishment, open design, layering, abstraction, modularity, linkage, interaction, social engineering attacks, cybersecurity user education, sensitive personal data, indentifying and documenting security requirements for software and systems.
This course introduces to linear and non-linear data structures and algorithm analysis. Topics include: arrays, linked lists, stacks, queues, trees (search, balanced), heaps, hash tables, graphs, numpy arrays, dataframes, asymptotic analysis including big-Oh notation, and techniques for measuring algorithm complexity. Students who have successfuly completed MIS 190 should not take this course.
This is the second course in the data structures sequence that introduces students to non-linear data structures: trees (binary, balanced, and n-ary) and graphs and how to use them to design efficient algorithms to solve fundamental computing problems such as sorting data and searching for information.
This course introduces to principles of digital logic and computer organization. Topics include: binary number system; hexadecimal notation; logic gates; Boolean algebra; processor, memory and I/O organization; instruction set architecture; performance optimization; hardware security and supply chain risks. Students who have successfully completed MIS 140 should not register for this course.
This course introduces the concepts of operating system design and implementation covering processes management, CPU scheduling, memory management and file management. Windows, Mac OS, and Linux based features will be explored.
An introduction to networks, protocols, and distributed systems. Topics include: OSI model, TCP/IP, LAN and WAN, layer 2 and layer 3 architecture, resource management, naming, addressing and routing, reliable communication, security, and higher-level services. Students who have successfully completed MIS 260 should not register for this course.
CIS 100
This course will introduce students to the concept of securing data in transfer or during storage. This includes a discussion on information security objectives: data integrity, authentication, and data privacy: classical ciphers and block ciphers: cryptography (secret key cryptography, public key cryptography), cryptographic algorithms used; message digests; password-based, address based, and cryptographic authentication; and end to end security.
CIS 160
This course introduces students to the principles and practice of digital forensics. Topics include: computer crime, intellectual property, privacy issues, legal codes; risks, vulnerabilities, and countermeasures; methods and standards for extraction, preservation, and deposition of legal evidence in a court of law.
This course focuses on the security aspects of systems that are composed of components and connections, and use software. It covers the concepts, principles, models, and techniques of access control, authentication, incident response and recovery, risk identification, monitoring and analysis, and systems and applications security. It provides students with advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies, and procedures.
With increasing importance of computer networks, network security has become a critical topic of concern for the field of cybersecurity. This course begins with a review of information security, networking and cryptography concepts followed by the practical techniques to manage implementation of network security solutions for any organization. Students will learn how to design and implement cybersecurity mechanisms for an organization's network.
This course introduces students to legal aspects of cyber security. Topics include: availability, integrity, confidentiality, risk analysis and incident response, intellectual property law, contracts in online transactions, tort law issues in cyberspace, the concept of privacy and its legal protections and the governance of information within organizations.
This course introduces the students to the principles and techniques of ethical hacking. The course topics include reconnaissance, scanning, exploitation, and result reporting. The student will have hands on experience in exploiting various vulnerabilities and weaknesses in computer systems and networks.
This senior capstone course provides students with a focused, team-based design experience. Students will work with other students, industry mentors, and a faculty advisor to apply computing and information scence methods in solving a real-world problem.
It is further recommended that the Cybersecurity majors obtain a minor or (preferably) a major in an additional discipline. All Cybersecurity majors must maintain a CIS GPA of 2.0 or higher. A student who does not satisfy this requirement may be dismissed from the major and/or prohibited from graduating with the major. A student who receives a C or below in CIS 210: Non-linear Data Structures must have the department’s permission to continue in the major.
Computer Science Minor (5 courses):
Required: CIS 100, CIS 200, CIS 210
Choose at least two other CIS courses (except CIS 201).
Data Science Minor (5 courses):
Required: CIS 100, CIS 150, CIS 200, STAT 120 or CIS 201
Choose at least one of: CIS 210, CIS 280, or CIS 350
Cybersecurity Minor (6 courses):
Required: CIS 100, CIS 160, CIS 230, CIS 261, CIS 360, CIS 361