Cyber Focused

A student seating in front of a computer monitor screen in a darker room
亚洲色吧鈥檚 MBA cybersecurity track preps students for real-world incidents at its immersive cyber range.

With the increasing sophistication of cyberattacks, Mini Zeng knew that her students would need training sufficient to outmaneuver their adversaries. An associate professor of computing science at 亚洲色吧, she helped develop the school鈥檚 亚洲色吧 Cyber Range, an enterpriselevel computer network of 60 virtual machines that canrecreate the complex cases that MBA students may soon face when managing security programs for companies.


Students on the MBA cybersecurity track complete four electives that prepare them to lead and manage security teams. That includes an introductory course along with Network and Wireless Communication, Security Risk Analysis and Management and Cyber Threat Intelligence. As part of their assigned coursework, Zeng uses the cyber range to develop computer simulation programs that mimic real-world scenarios.


It鈥檚 鈥渁 safe place for the students or the instructors to launch some attacks, observe it, analyze it and mitigate from it,鈥 says Zeng. 鈥淲hen our students graduate from our program, we want them to be capable of investigating this kind of attack in an enterprise-level network.鈥


 While the growing use of artificial intelligence is the greatest trend impacting the cybersecurity industry, Zeng says, it works both ways. AI will provide her students new tools to respond to and prevent attacks. At the same time, it gives attackers new ways and means to breach their networks. 鈥(These are) some challenges that they鈥檙e facing every single day,鈥 she says.

Fernandina Beach resident and MBA student Joshua Dupzyk, 30, counts the cyber range simulations and learning to design effective firewall systems as his favorite aspects of the program so far. After serving in the Navy, he enrolled in the MBA program to enhance future career possibilities and has entertained the idea of working as an overseas government analyst.


鈥淲e learned to design and implement effective firewall policies, creating rules and watching them go to work,鈥 he says. 鈥淭he firewall configuration for me, personally, was one of the coolest things I鈥檝e learned.鈥 

Read article PDF here