APCV 302 Statistics in Information Age APCV 310 Introduction to Computing APCV 320 Computational Thinking and Doing APCV 360 Database Management Fundamentals APCV 361 Data Analysis and Visualization APCV 381 Mobile Device Programming APCV 401 Introduction to Human-Computer Interaction APCV 403 Principles of Web Design APCV 498 Senior Capstone BASV 300 Introduction to Mathematical Reasoning for Security Professionals BASV 314 Mathematics for Applied Sciences BASV 376 Mathematics for Applied Technology CSCV 345 Analysis of Discrete Structures CSCV 460 Database Design CYBV 301 Fundamentals of Cybersecurity CYBV 302 Linux Security Essentials CYBV 303 Windows Security Essentials CYBV 310 Introduction to Security Programming I CYBV 311 Introduction to Security Programming II CYBV 312 Introduction to Security Scripting CYBV 326 Introductory Methods of Network Analysis CYBV 329 Cyber Ethics CYBV 330 Introduction to Industrial Control System Security CYBV 351 Signals Intelligence and Electronic Warfare CYBV 354 Principles of Open Source Intelligence CYBV 381 From Incident Response to Digital Forensics CYBV 382 Network Forensics CYBV 383 Mobile Device Forensics CYBV 384 Host and File System Forensics (Windows) CYBV 385 Introduction to Cyber Operations CYBV 386 Enterprise and File System Forensics (Linux) CYBV 388 Cyber Investigations and Forensics CYBV 400 Active Cyber Defense CYBV 435 Cyber Threat Intelligence CYBV 436 Counter Cyber Threat Intelligence CYBV 437 Deception, Counter-Deception & Counter-Intelligence CYBV 440 Digital Espionage CYBV 441 Cyber War, Terror and Crime CYBV 442 Regulatory Limitations and Controls for Cyber Operations CYBV 443 Legal and Privacy Constraints in Cyber Operations CYBV 450 Information Warfare CYBV 454 Malware Threats & Analysis CYBV 460 Principles of Zero Trust Networks CYBV 470 C Programming for Security Professionals CYBV 471 Assembly Language Programming for Security Professionals CYBV 473 Violent Python CYBV 474 Advanced Analytics for Security Operations CYBV 475 Cyber Deception Detection CYBV 477 Advanced Computer Forensics CYBV 479 Wireless Networking and Security CYBV 480 Cyber Warfare CYBV 481 Social Engineering Attacks and Defenses CYBV 498 Capstone in Cyber Operations ENGV 306 Advanced Composition INTV 305 Introduction to Intelligence & Information Operations INTV 377 Psychological Operations LDRV 302 The Leadership Function LDRV 303 Negotiations LDRV 304 The Human Resource Function LDRV 305 Organizational Behavior LDRV 311 Market Planning LDRV 315 Entrepreneurship and Small Business Growth Dynamics LDRV 393 Internship LDRV 397A Junior Mentoring Workshop LDRV 397B Senior Mentoring Workshop LDRV 400 Developing and Maintaining Work Teams LDRV 401 Leadership in a Diverse Environment LDRV 404 The Business Function LDRV 471 Psychology of Leadership LDRV 493 Internship LDRV 499 Independent Study NETV 301 Virtualization: Applications and Best Practices NETV 370 Introduction to Network Design and Architecture NETV 371 Network Security Principles NETV 374 Routing: Theories and Applications NETV 375 Advanced Routing and WAN Technologies NETV 378 System Administration NETV 379 Cloud Computing NETV 380 Introduction to Microsoft Azure NETV 381 Introduction to Amazon Web Services NETV 479 Advanced Cloud Computing: Applications and Best Practices NETV 480 Cloud Security: IR, Penetration Testing and Advanced Defense PSYV 375 Industrial-Organizational Psychology