1 |
AAL |
Advanced Algorithms |
Optional KU |
2 |
ACR |
Advanced Cryptography |
Optional KU |
3 |
ANT |
Advanced Network Technology and Protocols |
Optional KU |
4 |
ALG |
Algorithms |
Optional KU |
5 |
ATC |
Analog Telecommunications |
Optional KU |
6 |
BCO |
Basic Cyber Operations |
Optional KU |
7 |
CCO |
Cloud Computing |
Optional KU |
8 |
CCR |
Cyber Crime |
Optional KU |
9 |
CSE |
Cybersecurity Ethics |
Optional KU |
10 |
DBA |
Data Administration |
Optional KU |
11 |
DST |
Data Structures |
Optional KU |
12 |
DMS |
Database Management Systems |
Optional KU |
13 |
DAT |
Databases |
Optional KU |
14 |
DVF |
Device Forensics |
Optional KU |
15 |
DCO |
Digital Communications |
Optional KU |
16 |
DFS |
Digital Forensics |
Optional KU |
17 |
EBS |
Embedded Systems |
Optional KU |
18 |
FAC |
Forensic Accounting |
Optional KU |
19 |
FMD |
Formal Methods |
Optional KU |
20 |
FPM |
Fraud Prevention and Management |
Optional KU |
21 |
HRE |
Hardware Reverse Engineering |
Optional KU |
22 |
HFS |
Hardware/Firmware Security |
Optional KU |
23 |
HOF |
Host Forensics |
Optional KU |
24 |
IAA |
IA Architectures |
Optional KU |
25 |
IAC |
IA Compliance |
Optional KU |
26 |
IAS |
IA Standards |
Optional KU |
27 |
IDR |
Independent/Directed Study/Research |
Optional KU |
28 |
ICS |
Industrial Control Systems |
Optional KU |
29 |
ITC |
Introduction to Theory of Computation |
Optional KU |
30 |
IDS |
Intrusion Detection/Prevention Systems |
Optional KU |
31 |
LCS |
Life-Cycle Security |
Optional KU |
32 |
LSA |
Linux System Administration |
Optional KU |
33 |
LLP |
Low Level Programming |
Optional KU |
34 |
MEF |
Media Forensics |
Optional KU |
35 |
MOT |
Mobile Technologies |
Optional KU |
36 |
NWF |
Network Forensics |
Optional KU |
37 |
NSA |
Network Security Administration |
Optional KU |
38 |
NTP |
Network Technology and Protocols |
Optional KU |
39 |
OSH |
Operating Systems Hardening |
Optional KU |
40 |
OST |
Operating Systems Theory |
Optional KU |
41 |
PTT |
Penetration Testing |
Optional KU |
42 |
PRI |
Privacy |
Optional KU |
43 |
QAT |
QA/Functional Testing |
Optional KU |
44 |
RFP |
Radio Frequency Principles |
Optional KU |
45 |
SPP |
Secure Programming Practices |
Optional KU |
46 |
SAS |
Software Assurance |
Optional KU |
47 |
SRE |
Software Reverse Engineering |
Optional KU |
48 |
SSA |
Software Security Analysis |
Optional KU |
49 |
SCS |
Supply Chain Security |
Optional KU |
50 |
SCA |
Systems Certification and Accreditation |
Optional KU |
51 |
SPG |
Systems Programming |
Optional KU |
52 |
SSE |
Systems Security Engineering |
Optional KU |
53 |
VTT |
Virtualization Technologies |
Optional KU |
54 |
VLA |
Vulnerability Analysis |
Optional KU |
55 |
WAS |
Web Application Security |
Optional KU |
56 |
WSA |
Windows System Administration |
Optional KU |
57 |
WSN |
Wireless Sensor Networks |
Optional KU |
58 |
CSF |
Cybersecurity Foundations |
Foundational KU |
59 |
CSP |
Cybersecurity Principles |
Foundational KU |
60 |
ISC |
IT Systems Components |
Foundational KU |
61 |
BCY |
Basic Cryptography |
Technical Core KU |
62 |
BNW |
Basic Networking |
Technical Core KU |
63 |
BSP |
Basic Scripting and Programming |
Technical Core KU |
64 |
NDF |
Network Defense |
Technical Core KU |
65 |
OSC |
Operating Systems Concepts |
Technical Core KU |
66 |
CTH |
Cyber Threats |
Non-Technical Core KU |
67 |
CPM |
Cybersecurity Planning and Management |
Non-Technical Core KU |
68 |
PLE |
Policy, Legal, Ethics, and Compliance |
Non-Technical Core KU |
69 |
SPM |
Security Program Management |
Non-Technical Core KU |
70 |
SRA |
Security Risk Analysis |
Non-Technical Core KU |
71 |
OSA |
Operating Systems Administration |
Optional KU |
72 |
OP |
Independent/Directed Study/Research |
Foundational KU |
78 |
TC |
Basic Cryptography |
Foundational KU |
79 |
NT |
Cyber Threats |
Foundational KU |