AI for Cybersecurity Minor
Grade Requirements: As a cybersecurity student, you are expected to maintain an overall university GPA ≥2.3. Each computer science and cybersecurity course must be completed with a minimum grade ≥C+. All supporting courses required by the department must be completed with a minimum grade ≥C.
| Required Courses | ||
| Courses may require prerequisite courses | ||
| CSCD 320 | ALGORITHMS | 5 |
| CSCD 484 & 484L | MACHINE LEARNING and MACHINE LEARNING LAB | 4 |
| CYBR 403 | CYBERSECURITY POLICIES, PRIVACY AND LAWS | 4 |
| CYBR 434 & 434L | NETWORK SECURITY and NETWORK SECURITY LAB | 4 |
| CYBR 480 & 480L | AI FUNDAMENTALS and AI FUNDAMENTALS LAB | 4 |
| CYBR 481 & 481L | DEFENSIVE APPLICATIONS OF AI and DEFENSIVE APPLICATIONS OF AI LAB | 4 |
| CYBR 483 & 483L | OFFENSIVE APPLICATIONS OF AI and OFFENSIVE APPLICATIONS OF AI LAB | 4 |
| Total Credits | 29 | |
Students who earn an AI for Cybersecurity Minor from EWU should be able to:
- navigate the ethical and legal issues surrounding the use of AI in cybersecurity, ensuring compliance with regulations and ethical standards;
- grasp the core concepts of AI and machine learning, mainly as they apply to cybersecurity, including supervised and unsupervised learning, machine learning, neural networks, and deep learning;
- develop and deploy AI-driven tools and algorithms that enhance the detection, prevention, and response to cyber threats;
- use AI to detect cyber threats, including malware, phishing attacks, and network intrusions, by recognizing patterns, anomalies, and suspicious activities within vast datasets, networks, systems, and user behavior that may indicate a cyber attack;
- use AI to process and analyze large volumes of security-related data, identifying hidden threats, trends, and potential vulnerabilities in real-time;
- seamlessly integrate AI tools with existing cybersecurity infrastructure to enhance overall security posture;
- tailor AI-driven security solutions to meet the specific needs of different organizations, industries, and threat landscape.