– John Carpenter
Prevent. Protect. Respond. Get cutting-edge, real-life experience with TU’s cyber security program. Students perform security and vulnerability assessments for businesses, participate in hack-a-thons, conduct research and attend professional conferences. With hands-on learning and research opportunities, TU has placed interns at the FBI, NSA, United States Coast Guard Research and Development Center as well as the Center for Cyber Defense and Forensics.
The beauty of the Tiffin University Cyber Security major is that it is not narrowly focused. The curriculum addresses the entire range of cyber operations, from analyzing the largest national and international cyber policy issues, to collecting data off the smallest hand-held devices. Through this major, students are exposed to the entire breadth of the field.
The Cyber Security major addresses the evolving threats to our economy and society in cyberspace. The curriculum is designed to give students a solid background in technology applications, threat assessment, and mitigation. Using real-world case scenarios and threat actors, the program challenges students to think critically about interconnected systems and vulnerabilities. This diversified program culminates in a senior seminar that includes both digital forensics and cyber security students participating in a red team/blue team scenario, providing both teams the opportunity to manage an intrusion incident from inception to forensic analysis and reporting.
Ohio Police Officer Training Academy (OPOTA)
To be a sworn police officer in Ohio, you must successfully complete the Ohio Police Officer Training Academy (OPOTA). Tiffin University partners with Terra State Community College to include the cost of the academy in tuition and can be earned in just one semester.
This unique training academy is state mandated for all police officers and covers firearms, legal administration, human relations, traffic, patrol, driving, subject control, investigations, civil disorder, physical conditioning and other aspects of law enforcement. Students apply direct, hands-on practice in the crime lab, firing range and police cruisers. With experienced, certified instructors and hands-on application, our students consistently achieve passing rates on the state-certified exam.
Once graduates of the program earn the certification, they are immediately eligible for full-time employment.
“Tiffin University gave me my best friend and pushed me to my highest potential. The OPOTA program put me ahead in the hiring process and my bachelor’s degree set me apart from other candidates.”
Hometown: Marion, Ohio
Graduation: Spring, 2019
Major: Bachelor of Criminal Justice in Law Enforcement
Position: Police Officer with the City of Marysville Division of Police
Core Curriculum of the School of Criminal Justice & Social Sciences 49 hours
Cyber Security Core 12 hours
- CDS152 Introduction to Cyber Defense
- CDS345 Cyber Law & Ethics
- POL151 Introduction to National Security Studies
- POL313 American National Security Policy
Cyber Security Major 51 hours
- CDS344 Information Security
- CDS348 Incident Management
- CDS355 Penetration Testing and Vulnerability Analysis
- CDS390 Special Topics
- CDS444 Wireless Security
- CDS445 Cyber Warfare
- CDS491 Senior Seminar In Cyber Defense (w)
- CIT320 Computer Architecture and Diagnostics
- CST155 Introduction to Operating Systems
- CST201 Introduction to Programming
- CST230 Networking Fundamentals
- CST280 Database
- CST330 Network Infrastructure I
- CST412 IT Project Management
- ENF245 Emergency Organization and Management
- SCS300 Reearch Design (w)
- SCS470 Internship
Total BA hours 121-123 hours
This is a sample course sequence to illustrate course offerings for this major. Consult the official Academic Bulletin for detailed registration and advising information.
On Campus - Offered in a 15-week semester format with start dates of January and August
There are no related concentrations available
Penetration Testing & Vulnerability Analysis (CDS355) - This course will equip students to evaluate a network to discover potential security vulnerabilities and rectify those issues. Students will learn the most common security mistakes as well as the necessary corrective action, and will be able to probe networks to determine if any of those common vulnerabilities can be exploited. The roles, missions, and appropriate applications of Red Teams and Blue Teams will be discussed.
Information Security (CDS344) - This course will introduce information security as an essential component in our war against terrorism. All information must be secure or the probability of winning the war will be diminished. With advances in technology and software, cyber-terrorism has become very real. Computer hackers and terrorists can shut down our nation’s most critical infrastructures. There can be no doubt that cyber-terror can pose a very real threat to this nation’s security. Students will become familiar with the entire arena of information security.
Cyber Warfare (CDS445) - This course explores the past, current, and future threats of information warfare and cyber terrorism. It provides an overview of information warfare and cyber terrorism techniques and capabilities of state and non-state actors through case study analysis. An exploration of current and future technology and development of information warfare and cyber terrorism techniques is utilized to develop future threat matrices and countermeasures.
Incident Management (CDS348) - This course will train students in methods used to work through and recover from a network incident, be it the result of network failure, natural disaster, or cyber-attack. Course material will include the various Mission Assurance Levels used by major portions of the U.S. Government, as well as how to plan, conduct, and gather lessons-learned from war games where Intentional failures have been planned in as part of the exercise. Finally, the role that damage assessment plays in post-incident response/recovery will be emphasized.
- Cyber Security Analyst
- Cyber Security Incident Responder
- Cybersecurity & Infrastructure Security Agency (CISA)
- Forensics Computer Analyst
- Intrusion Analyst
- National Security Agency (NSA)
- Penetration Tester
- Security Audit & Risk Management Specialist
- Security Operations Center Analyst
- Threat Hunter
- United States Cyber Command
- U.S. Department of Energy
While it is extremely competitive to obtain such appointments, TU alumni have gone on to careers in these agencies:
- Department of Homeland Security Agencies
- Private Enterprise Providing Cyber Services
- Department of Defense Agencies