Minor in Cyber Security
The College of Engineering offers several minors for students at The University of Toledo. These minors are recommended for students who want to enhance their academic programs with engineering-related course work and are intended to allow students to develop expertise in a discipline outside their majors. Students taking courses in theses minors must meet course prerequisite requirements. Students should contact advisors in the College of Engineering for additional details about the course requirements of minors and contact advisors in their home college to determine how the minors will fit into their degree curriculum. Note that per University of Toledo policy, minors cannot be declared by students in the same major as a given minor since at least 12 hours of the minor must be distinct from any credit hours used to fulfill any major the student is pursuing.
Code | Title | Hours |
---|---|---|
CSET 1100 | Introduction to Computer Science and Engineering Technology | 4 |
CSET 1200 | Object Oriented Programming and Data Structures | 3 |
CSET 2200 | PC and Industrial Networks | 4 |
CSET 4750 | Computer Networks And Data Communication | 4 |
CSET 4850 | Computer and Network Security | 4 |
EECS 4790 | Network Security | 4 |
Total Hours | 23 |
First Term | Hours | |
---|---|---|
CSET 1100 | Introduction to Computer Science and Engineering Technology | 4 |
CSET 1200 | Object Oriented Programming and Data Structures | 3 |
Hours | 7 | |
Second Term | ||
CSET 2200 | PC and Industrial Networks | 4 |
Hours | 4 | |
Third Term | ||
CSET 4750 | Computer Networks And Data Communication | 4 |
Hours | 4 | |
Fourth Term | ||
CSET 4850 | Computer and Network Security | 4 |
EECS 4790 | Network Security | 4 |
Hours | 8 | |
Total Hours | 23 |
2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
3. Communicate effectively in a variety of professional contexts.
4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.