free simple site templates
Mobirise

Christopher Mansour, Ph.D.

Chair, Computing and Information Science Department

Assistant Professor of Cyber Security at Mercyhurst University

Courses Taught

  1. CIS 160 - Introduction to Cyber Security
    This course introduces students to concepts in cyber security including: fundamentals of secure policy design: least privilege, fail-safe defaults, separation, minimize trust, economy of mechanism, minimize common mechanism, open design, layering, abstraction, modularity, linkage, interaction, social engineering attacks, cybersecurity user education, sensitive personal data, indentifying and documenting security requirements for software and systems.
  2. CIS 200 - Linear Data Structures
    This course introduces linear data structures and algorithm analysis. Topics in- clude: arrays, linked lists, stacks, queues, hash tables, dataframes, asymptotic analysis include big-Oh notation, and techniques for measuring algorithmic com- plexity
  3. CIS 230 - Operating Systems
    This course introduces the concepts of operating system design and implementation. In particular, the course will cover processes management, CPU scheduling, memory management and file management. At the end, Windows, Mac OS and Linux based features will be explored.
  4. CIS 261 - Information Security
    This course will introduce students to the concept of securing data in transfer or during storage. This includes a discussion on information security objectives: data integrity, authentication, and data privacy: classical ciphers and block ciphers: cryptography (secret key cryptography, public key cryptography), cryptographic algorithms used; message digests; password-based, address based, and cryptographic authentication; and end to end security.
  5. CIS 360 - Computer Systems Security
    This course focuses on the security aspects of systems that are composed of com- ponents and connections, and use software. It addresses the security issues of connecting components and using them within larger systems. It covers the con- cepts, principles, models and techniques of access control, authentication, incident response and recovery, risk identification, monitoring and analysis, and systems and applications security. This course discusses important body of knowledge concepts required by (ISC)2 SSCP certificate.
  6. CIS 365 - Cyber Law and Policy
    This course aims to synthesize the cyber security laws that are most likely to affect US corporate and government operations. The course covers different aspects of national and some international legal issues concerning cyberspace. This includes computer-related crimes, legal rights and liabilities associated with computer security, computer fraud and unauthorized computer use, information privacy, espionage, HIPPA, Gramm-Leach-Bliley, GDPR and Digital Rights Management. The course covers six areas of law as it applies to cyberspace which include: private sector data security law, anti-hacking law, public-private cyber security efforts, government surveillance laws, cyber security requirements for government contractors, and privacy law.
  7. CIS 500 - Computing and Information Science Concepts 
    The Computing and Information Science Concepts course serves as an introduction to the Computing and Information Science various disciplines. It covers a variety of topics including: Data Representation and Binary Systems, Data Manipulation and Logic Operations, Computer Networking Concepts, Cyber Security Concepts and Computing Ethics. This course consists of four main parts: Fundamentals of Information Encoding, Computer Communications and Networks, Cyber Security, and Ethics in Computing.
  8. CIS 500 (ONLINE) - Computing and Information Science Concepts 
    The Computing and Information Science Concepts course serves as an introduction to the Computing and Information Science various disciplines. It covers a variety of topics including: Data Representation and Binary Systems, Data Manipulation and Logic Operations, Computer Networking Concepts, Cyber Security Concepts and Computing Ethics. This course consists of four main parts: Fundamentals of Information Encoding, Computer Communications and Networks, Cyber Security, and Ethics in Computing.
  9. CIS 502 (ONLINE) - Penetration Testing
    This course introduces students to the principles and techniques of penetration testing and ethical hacking. Course topics include, reconnaissance, scanning, exploitation, and result reporting. The students will learn how system vulnerabilities can be exploited and the way to avoid such problems.
  10. CIS 510 - Algorithm Development Using Python
    This course reviews computer programming concepts and practice. Topics include: algorithms, abstract data types, data structures, and software engineering. Students will get hands-on experience with the use of a high-level programming language, Python, to search and sort data.
  11. CIS 510 (ONLINE) - Algorithm Development Using Python
    This course reviews computer programming concepts and practice. Topics include: algorithms, abstract data types, data structures, and software engineering. Students will get hands-on experience with the use of a high-level programming language, Python, to search and sort data.
  12. CIS 560 (ONLINE) - Cyber Networks 
    The Cyber Networks course prepares students to better understand today’s cyber networks and how they can support the requirements of organizations. It introduces networking basics and demonstrates how networks can support the increasing demands of advanced communications. The course investigates the underlying technology of the Internet including a survey of distributed applications operating over the Internet. The course further investigates the details of the Internet architecture and the TCP/IP protocol suite, covering the protocols that provide communications services to end systems and the management and control protocols that create the Internet from disparate underlying networks and technologies.
  13. CIS 565 (ONLINE) - System and Application Security
    This course focuses on the security aspects of systems that are composed of components and connections and use software. It addresses the security issues of connecting components and using them within larger systems. It covers the principles, models and techniques of access control, authentication, secure communication and audit, system's virtualization, real-time systems, software and OS security.
  14. CIS 566 (ONLINE) - Cloud Security
    This foundational course prepares students to better understand today's cyber networks and how they can support the requirements of organizations. It introduces networking basics and demonstrates how networks can support the increasing demands of advanced communications. The course examines networking standards, protocols, architectures, management and security.

Mobirise