| 1 |
AAL |
Advanced Algorithms |
Optional KU |
| 2 |
ACR |
Advanced Cryptography |
Optional KU |
| 3 |
ANT |
Advanced Network Technology and Protocols |
Optional KU |
| 4 |
ALG |
Algorithms |
Optional KU |
| 5 |
ATC |
Analog Telecommunications |
Optional KU |
| 6 |
BCO |
Basic Cyber Operations |
Optional KU |
| 7 |
CCO |
Cloud Computing |
Optional KU |
| 8 |
CCR |
Cyber Crime |
Optional KU |
| 9 |
CSE |
Cybersecurity Ethics |
Optional KU |
| 10 |
DBA |
Data Administration |
Optional KU |
| 11 |
DST |
Data Structures |
Optional KU |
| 12 |
DMS |
Database Management Systems |
Optional KU |
| 13 |
DAT |
Databases |
Optional KU |
| 14 |
DVF |
Device Forensics |
Optional KU |
| 15 |
DCO |
Digital Communications |
Optional KU |
| 16 |
DFS |
Digital Forensics |
Optional KU |
| 17 |
EBS |
Embedded Systems |
Optional KU |
| 18 |
FAC |
Forensic Accounting |
Optional KU |
| 19 |
FMD |
Formal Methods |
Optional KU |
| 20 |
FPM |
Fraud Prevention and Management |
Optional KU |
| 21 |
HRE |
Hardware Reverse Engineering |
Optional KU |
| 22 |
HFS |
Hardware/Firmware Security |
Optional KU |
| 23 |
HOF |
Host Forensics |
Optional KU |
| 24 |
IAA |
IA Architectures |
Optional KU |
| 25 |
IAC |
IA Compliance |
Optional KU |
| 26 |
IAS |
IA Standards |
Optional KU |
| 27 |
IDR |
Independent/Directed Study/Research |
Optional KU |
| 28 |
ICS |
Industrial Control Systems |
Optional KU |
| 29 |
ITC |
Introduction to Theory of Computation |
Optional KU |
| 30 |
IDS |
Intrusion Detection/Prevention Systems |
Optional KU |
| 31 |
LCS |
Life-Cycle Security |
Optional KU |
| 32 |
LSA |
Linux System Administration |
Optional KU |
| 33 |
LLP |
Low Level Programming |
Optional KU |
| 34 |
MEF |
Media Forensics |
Optional KU |
| 35 |
MOT |
Mobile Technologies |
Optional KU |
| 36 |
NWF |
Network Forensics |
Optional KU |
| 37 |
NSA |
Network Security Administration |
Optional KU |
| 38 |
NTP |
Network Technology and Protocols |
Optional KU |
| 39 |
OSH |
Operating Systems Hardening |
Optional KU |
| 40 |
OST |
Operating Systems Theory |
Optional KU |
| 41 |
PTT |
Penetration Testing |
Optional KU |
| 42 |
PRI |
Privacy |
Optional KU |
| 43 |
QAT |
QA/Functional Testing |
Optional KU |
| 44 |
RFP |
Radio Frequency Principles |
Optional KU |
| 45 |
SPP |
Secure Programming Practices |
Optional KU |
| 46 |
SAS |
Software Assurance |
Optional KU |
| 47 |
SRE |
Software Reverse Engineering |
Optional KU |
| 48 |
SSA |
Software Security Analysis |
Optional KU |
| 49 |
SCS |
Supply Chain Security |
Optional KU |
| 50 |
SCA |
Systems Certification and Accreditation |
Optional KU |
| 51 |
SPG |
Systems Programming |
Optional KU |
| 52 |
SSE |
Systems Security Engineering |
Optional KU |
| 53 |
VTT |
Virtualization Technologies |
Optional KU |
| 54 |
VLA |
Vulnerability Analysis |
Optional KU |
| 55 |
WAS |
Web Application Security |
Optional KU |
| 56 |
WSA |
Windows System Administration |
Optional KU |
| 57 |
WSN |
Wireless Sensor Networks |
Optional KU |
| 58 |
CSF |
Cybersecurity Foundations |
Foundational KU |
| 59 |
CSP |
Cybersecurity Principles |
Foundational KU |
| 60 |
ISC |
IT Systems Components |
Foundational KU |
| 61 |
BCY |
Basic Cryptography |
Technical Core KU |
| 62 |
BNW |
Basic Networking |
Technical Core KU |
| 63 |
BSP |
Basic Scripting and Programming |
Technical Core KU |
| 64 |
NDF |
Network Defense |
Technical Core KU |
| 65 |
OSC |
Operating Systems Concepts |
Technical Core KU |
| 66 |
CTH |
Cyber Threats |
Non-Technical Core KU |
| 67 |
CPM |
Cybersecurity Planning and Management |
Non-Technical Core KU |
| 68 |
PLE |
Policy, Legal, Ethics, and Compliance |
Non-Technical Core KU |
| 69 |
SPM |
Security Program Management |
Non-Technical Core KU |
| 70 |
SRA |
Security Risk Analysis |
Non-Technical Core KU |
| 71 |
OSA |
Operating Systems Administration |
Optional KU |
| 72 |
OP |
Independent/Directed Study/Research |
Foundational KU |
| 78 |
TC |
Basic Cryptography |
Foundational KU |
| 79 |
NT |
Cyber Threats |
Foundational KU |