Go to content

Undergraduate Catalog 2013-2014

Approved Courses

The following list includes undergraduate courses that have been approved as of  June 2010.  Courses added after that date do not appear in this list.  Courses eliminated after that date may still appear.  Not every course is offered regularly.  Students should consult the Schedule of Classes at www.testudo.umd.edu  to ascertain which courses are actually offered during a given semester.


Number   Eligibility
000-099   Non-credit course
100-199   Primarily freshman course
200-299   Primarily sophomore course
300-399   Junior, senior course not acceptable for credit toward graduate degrees
386-387   Campus-wide internship courses; refer to information describing Experiential Learning
400-499   Junior, senior course acceptable for credit toward some graduate degree
500-599   Professional School course (Dentistry, Architecture, Law, Medicine) or post-baccalaureate course
600-899   Course restricted to graduate students
799   Master Thesis credit
899   Doctoral Dissertation credit

Use the search box below to view the approved courses.

Courses in "HACS-ACES-Cybersecurity"

HACS - ACES-Cybersecurity

HACS 100 Foundations in Cybersecurity I (2) Restriction: Must be a first-year student in the ACES Honors program. Interdisciplinary foundational course of the ACES program. Through lectures, lab activities, and discussions, students will learn and practice various aspects of cybersecurity. Weekly technical lectures will introduce students to the operating system UNIX. Students will partner with the Division of Information Technology in a project to engage the University of Maryland community in a cyber- hygiene and cyber-ethics campaign based on the concepts learned in class.

HACS 102 Foundations in Cybersecurity II (3) Prerequisite: HACS100. Must be a first-year student in the ACES Honors program. Second interdisciplinary foundational course of the ACES program. Through lectures and project work, students will learn and practice cybersecurity. Students will work in teams to develop a honeypot project, and work on this project throughout the course. Weekly lectures will supplement project work, focusing on types of computer attacks and protections, data collection and analysis, and other foundational cybersecurity concepts.

Return to top