Integrating Drones in a Cybersecurity Infrastructure Emphasis

The drone market has been rapidly growing with various industries integrating drones into their daily operations. Homeland Security and Emergency Management is one area of interest. Emergency preparedness, planning, and security also go together with homeland security. Drones provide new opportunities for aspiring entrepreneurs in the area of homeland security and emergency management. In this emphasis you will gain insight on drone security topics including understanding malware, tools used to combat cyber criminals, drones used by emergency response teams, cyber terrorism, and digital legal considerations. You will also examine the FAA Part 107 UAS classification, certification, and operating rules, and prepare to take the Federal Aviation Administration (FAA) exam in commercial drone operations.

 

Undergraduate Integrating Drones in a Cybersecurity Infrastructure Emphasis Courses

AVI 200 Commercial Drone Pilot

3 Credits

This course prepares students to take the Federal Aviation Administration (FAA) exam in commercial drone operations. Students explore FAA regulations to operate small unmanned aircraft systems (UAS) in the National Airspace System (NAS) for purposes other than hobby and recreation. This course examines the FAA Part 107 UAS classification, certification, and operating rules.

Completion of AVI 200, does not lead to certification. Upon successful completion of AVI 200, students will be prepared to take the FAA Part 107. Once students pass the exam, they will be eligible for certification as a drone pilot. Certification is granted by the Federal Aviation Administration and not by the University of Arizona Global Campus. It is the student’s responsibility to locate an approved PSI Testing Center

CYB 301 Introduction to Cyber & Data Security Technology

3 Credits

This course introduces students to the principles of information systems security (confidentiality, integrity, and availability) and the seven domains of the typical IT infrastructure. Risks, threats, and vulnerabilities will be defined. Creation of an IT security policy framework will be emphasized. The following topics will be introduced: the risk management process, cryptography, compliance laws, and information security standards. At the end of the course, students will be able to apply the security life cycle to an information system.

CYB 401 Risk Management & Infrastructure

3 Credits

This course builds upon the risk management concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. Topics presented are risk management standards, methods, and tools and IT governance and control frameworks. Methods to prepare a risk analysis will be reviewed. Upon completion of the course, students will be able to identify an organization’s threats and vulnerabilities, and the associated risks along with the probability that the risks will occur.

close button

Let us help.

Fill out this form to talk with an advisor.

Are you currently a licensed RN?

This program requires you to be a current licensed registered nurse. Please check out other programs to reach your education goals such as the BA in Health and Wellness.

Let Us Help

Explore something different
Didn't find what you need?
What information is most important to you at this point in time?

Please provide a few details

Are you currently a licensed RN?

This program requires you to be a current licensed registered nurse. Please check out other programs to reach your education goals such as the BA in Health and Wellness.

I agree to the contact methods outlined below