Appendix D: UNIVERSITY OF MARYLAND POLICY AND PROCEDURES ON THE DISCLOSURE OF STUDENT EDUCATION RECORDS III-6.30(A)
Appendix J: UNIVERSITY OF MARYLAND PROCEDURES FOR REVIEW OF ALLEGED ARBITRARY AND CAPRICIOUS GRADING--UNDERGRADUATE STUDENTS III-1.20(B)
Appendix M: UNIVERSITY OF MARYLAND POLICY ON THE COLLECTION, USE AND PROTECTION OF ID NUMBERS VI-26.00(A)
Appendix O: UNIVERSITY OF MARYLAND POLICY ON PROMOTING RESPONSIBLE ACTION IN MEDICAL EMERGENCIES (APPROVED BY THE PRESIDENT V-1.00(J)
Approved CoursesThe following list includes undergraduate courses that have been approved as of June 2010. Courses added after that date do not appear in this list. Courses eliminated after that date may still appear. Not every course is offered regularly. Students should consult the Schedule of Classes at www.testudo.umd.edu to ascertain which courses are actually offered during a given semester.
COURSE NUMBERING SYSTEM
Use the search box below to view the approved courses.
Courses in "HACS-ACES-Cybersecurity"
HACS - ACES-Cybersecurity
HACS 100 Foundations in Cybersecurity I (2) Restriction: Must be a first-year student in the ACES Honors program. Interdisciplinary foundational course of the ACES program. Through lectures, lab activities, and discussions, students will learn and practice various aspects of cybersecurity. Weekly technical lectures will introduce students to the operating system UNIX. Students will partner with the Division of Information Technology in a project to engage the University of Maryland community in a cyber- hygiene and cyber-ethics campaign based on the concepts learned in class.
HACS 102 Foundations in Cybersecurity II (3) Prerequisite: HACS100. Must be a first-year student in the ACES Honors program. Second interdisciplinary foundational course of the ACES program. Through lectures and project work, students will learn and practice cybersecurity. Students will work in teams to develop a honeypot project, and work on this project throughout the course. Weekly lectures will supplement project work, focusing on types of computer attacks and protections, data collection and analysis, and other foundational cybersecurity concepts.