Mathematics and Computer Science

Mission Statement Top of Page

UW-Superior's Mathematics and Computer Science Department provides majors and minors in Computer Science, Mathematics, and Mathematics Education. The programs provide a core of fundamental courses along with an array of electives that enable students to pursue special interests. Using this versatile, highly regarded program, students can choose a major, minor, certification or associates degree that prepares them for a career or graduate study in Computer Science, Mathematics, Information Technology and Systems, Engineering or Mathematics Education.

Faculty and Staff Top of Page

Bezroukov, Serguei - Professor
Glesener, Kristopher - Senior Lecturer
Gu, Xiaofeng - Assistant Professor
Kahler, Heather - Senior Lecturer
Khoroosi, Hossain - Sr Lecturer, Mathematics
Leck, Uwe - Associate Professor
Lynch, Shaun - Professor, Info Technology
Lynch, Patser - Academic Department Associate
Rosenberg, Steven - Associate Professor
Scott, Chad - Professor and Department Chair
Toscano, Marilyn - Senior Lecturer
Tucker, Shin-Ping - Associate Professor

Degrees Top of Page

Course Descriptions Top of Page

Go to:
CSCI - Computer Science
Catalog Nbr.Course Title/Course TopicsCredits
CSCI 681Special Topics1.00 - 4.00
Graduate level investigation of one or more topics of current interest. Not intended for independent study projects. May be repeated, but no more than a total of eight credits may be earned from both MATH 681 and CSCI 681.
Typically Offered:
Occasional by Demand
 
CYB - Cybersecurity
Catalog Nbr.Course Title/Course TopicsCredits
CYB 700Cybersecurity Fundamentals3.00
ntroduces fundamental concepts and design principles in cybersecurity. Students will understand what, why, and how to protect in the cyberworld. Topics include CIA (Confidentiality, Integrity, and Availability), threats, attacks, defense, least privilege, access control and password management, security policies, critical controls, incident-handling and contingency planning, risk assessment and management.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 703Network Security3.00
xamines network architectures, threats and attack surfaces exploited by these threats. Students will look at network traffic inspection, common attacks and defensive techniques like encryption, network segmentation, firewalls, application proxies, honeypots, DMZs, monitoring networks using: intrusion detection and intrusion prevention systems, and network access control.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 705Cybersecurity and Society3.00
Presents the principles of applied sociology that account for the human factors in security systems. Topics include an examination of the human role in cybersecurity, the role of security in the context of an organization, and a special focus on the development and implementation of cybersecurity policies.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 707Cybersecurity Planning3.00
Instruction on the process used to develop and maintain appropriate security levels for an organization with a focus on implementing a comprehensive security program, a documented set of security policies, procedures, guidelines, and standards. Topics include security planning, strategies, controls, and metrics for measuring the effectiveness.
Prerequisites:
CYB 700 prerequisite
Typically Offered:
Fall, Spring, and Summer Terms
CYB 710Introductory Cryptography3.00
Fundamentals of applied cryptography, including encryption and decryption, symmetric and asymmetric systems, pseudorandom functions, block ciphers, hash functions, common attacks, digital signatures, key exchange, message authentication and public key cryptography. Implemen-tation of cryptographic systems in an approved programming language. Survey of relevant math-ematical concepts, including elementary number theory.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 715Managing Security Risk3.00
Covers risk management processes and tools, risk assessment and analysis models, economic and control implications, risk measurement, and the ethics of risk. Students will communicate the technical and management-aspects of risk, based on research of their chosen industry, related regulation, recent industry reports, and risk implications to organizations, individuals and the nation.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 720Communication in Cybersecurity3.00
Research, organize, and present technical information to audiences with varying goals and technical needs. Emphasis on ethics, critical thinking, listening skills, and feedback to develop effective messages utilizing verbal and nonverbal communication strategies and visual aids. Individual and group presentations and projects will emulate professional scenarios in cybersecurity.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 725Computer Forensics3.00
This course provides instruction on the investigative and forensics processes of digital evidence with a focus on identifying indicators of compromise, the use of common forensics tools, and the preservation of forensics tools. Topics include forensics iconology, and the analysis of disk, memory, chip-off, mobile device, and OS artifacts.
Prerequisites:
Successful completion of CYB 700, 703
Typically Offered:
Fall, Spring, and Summer Terms
CYB 730Computer Criminology3.00
A primer on modern criminology with specific attention to the aspects of technology that facilitate criminal behaviors. Topics include computer crime laws, criminological theories of computer crime, court room and evidentiary procedure, idiographic and nomothetic digital profiling, computer crime victimology, habit/authorship attribution, stylometry, and case linkage analysis.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 735Network Forensics3.00
Covers protocol analysis, identification of malicious behavior in systems, and forensic investigations through event log aggregation, correlation and analysis. Students will analyze clips of network protocol analysis to discern methods of attacks and malicious activities. Reviews wired and wireless protocols and cover their associated attacks, with case studies involving protocol analysis, log analysis, and other tools.
Prerequisites:
Successful completion of CYB 703
Typically Offered:
Fall, Spring, and Summer Terms
CYB 740Incident Response and Remediation3.00
Addresses how to set up an incident response system in an organization and the phases of an IR: Preparation, Identification, Notification, Containment, and Eradication of the threat actors, and Recovery and Reporting to prevent future incidents. Students will learn about the use of IDS and forensics, dealing with false alarms and the remediation process to minimize business impact, plan business continuity, and work with law enforcement, auditors, insurance, and compliance.
Prerequisites:
Successful completion of CYB 700, 703, 705, 707, 715, 720
Typically Offered:
Fall, Spring, and Summer Terms
CYB 745Secure Operating Systems3.00
Covers operating systems security infrastructure. Topics include, for a given operating system (Windows/Linux), updates and patches, access controls and account management, configuration management, hardening and securing services, and the use of scripting languages to automate security management. Additional topics may include auditing and forensics, virtualization and cloud computing.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 750Offensive Security3.00
This course includes active defenses such as penetration testing, log management, hacking, threat management and system posturing. Students completing this course will have an understanding of, and the ability to preemptively secure computer and network resources by utilizing information about threats, actors and attack vectors and the ethics behind using this data.
Prerequisites:
Successful completion of CYB 700, 703
Typically Offered:
Fall, Spring, and Summer Terms
CYB 755Security Administration3.00
Covers the policy and governance aspects of security. Topics include application of security policies, standards, procedures and guidelines to administration of IT and communications, assessment of compliance including contractual, legal, industry standard, privacy and regulatory requirements, and implementation of security audits and assessment of security performance and security policy efficacy.
Prerequisites:
Successful completion of CYB 700, 703, 705, 707, 715, 720
Typically Offered:
Fall, Spring, and Summer Terms
CYB 760Leadership & Teams3.00
Focuses on leadership best practices and the interpersonal processes and structural characteristics that influence the effectiveness of teams. Emphasis will be placed on leadership models, principles of team building, group dynamics, problem solving, and crisis management in cybersecurity issues. Course will include case studies of modern security incidents.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 765Cybersecurity Management3.00
Covers management of cybersecurity policies and strategies at the organizational, national, and transnational levels. Examines the implications of key domestic and international regulations and changes in information technology and communications on security operations. Includes development of organizational security preparation, processes, and responses, and developing a disaster recovery program.
Prerequisites:
Successful completion of CYB 700, 703, 705, 707, 715, 720
Typically Offered:
Fall, Spring, and Summer Terms
CYB 770Security Architecture3.00
Focuses on security architectures for the protection of information systems and data. Students completing this course can identify potential vulnerabilities in system architectures and design secure architectures. Topics include common enterprise and security architectures and their key design elements, such as secure cloud computing and virtualization infrastructures.
Prerequisites:
Successful completion of CYB 703
Typically Offered:
Fall, Spring, and Summer Terms
CYB 775Applied Cryptography3.00
An in-depth study of modern cryptography. Topics include public key and private key cryptography, types of attacks, cryptanalysis, perfect secrecy, hashing, digital signatures, virtual private networks, and quantum key cryptography. Topics from number theory and discrete probability necessary for understanding current cryptosystems and their security will be covered.
Prerequisites:
Successful completion of CYB 710
Typically Offered:
Fall, Spring, and Summer Terms
CYB 780Software Security3.00
Covers the foundations of engineering secure applications, including techniques used to engineer secure software and assess the security of applications. Topics include exploiting web vulnerabilities, secure development processes, implementing security features such as secure data storage and transmission, threat modeling, security requirements, code analysis, and penetration testing.
Typically Offered:
Fall, Spring, and Summer Terms
CYB 785Cyber-Physical Sys. Security3.00
Covers the fundamentals and techniques to design and implement cyber-physical systems. Topics include the architecture of cyber-physical systems, exploiting software vulnerabilities, secure coding, microservices security, cloud services security, reverse engineering, security assessment of cyber-physical systems, and data analytics for security.
Prerequisites:
Successful completion of CYB 775
Typically Offered:
Fall, Spring, and Summer Terms
CYB 789Cybersecurity Pre-capstone3.00
Prepares student for capstone experience. Draws on skills learned, students will submit a written project proposal - with organization, timeline, learning objectives, and specific deliverables identified – for faculty approval. This course is a pre-requisite for the capstone course.
Prerequisites:
Completion of CORE courses CYB 700, 703, 705, 707, 710, 715, 720, 725, 730, 740, 745, 750, 755, 760, 765, 770, 775, 780, 785
Typically Offered:
Fall, Spring, and Summer Terms
CYB 790Cybersecurity Capstone3.00
Students present project identified in Capstone Preparation and submit a written report plus oral presentation to both faculty and host organization. Students will be assessed on clarity and content of written report and presentation.
Prerequisites:
Successful completion of CYB 789
Typically Offered:
Fall, Spring, and Summer Terms
 
ITM - Information Technology Management
Catalog Nbr.Course Title/Course TopicsCredits
ITM 700Communications for IT Professionals3.00
This course focuses on developing communication skills for IT professionals. Students will learn how to deliver effective presentations, conduct crucial conversations with stakeholders, and develop verbal and nonverbal communication skills emphasizing cultural sensitivity, diversity, and ethics. Students will also conduct relevant research and critically evaluate information to make informed evidence-based decisions.
Prerequisites:
Admission to MS in Information Technology Management program
Typically Offered:
Fall, Spring, and Summer Terms
ITM 705Leading the IT Function3.00
This course focuses on the differences between and application of management and leadership theories in an IT environment. Utilizing an array of assessment activities, students will identify and understand one’s own personal assets and liabilities to become an effective leader and agent of change in a complex adaptive system.
Prerequisites:
Admission to MS in Information Technology Management program
Typically Offered:
Fall, Spring, and Summer Terms
ITM 710Finance for IT Managers3.00
This course will frame financial decisions within general and project accounting principles. Topics include: pro forma financial statements, time value of money, cash flows and equivalence, depreciation, net present value, rate of return, and ratio analysis. Students will prepare budgets that prioritize projects within constraints, address uncertainty and intangibles, and integrate with project scheduling.
Prerequisites:
Admission to MS in Information Technology Management program
Typically Offered:
Fall, Spring, and Summer Terms
ITM 715Data Science3.00
This course examines key data science concepts, methods, and processes. It addresses issues for developing, managing and supporting data-driven decision-making in the organization and provides knowledge and tools for incorporating data science into IT project workflows. Topics include, but are not limited to, data analytics, data warehousing, machine learning, and artificial intelligence.
Prerequisites:
Admission to MS Information Technology Management Program and ITM 710.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 720Cloud Computing and Enterprise Applications3.00
Students will learn to leverage cloud services to streamline computing resources, deploy enterprise applications, improve user access and system reliability, and utilize advanced computing capabilities. Foundation concepts include: virtualization, multi-tenant architecture, and software defined networking. Examines the full range of services available to organizations along with deployment strategies, evaluation criteria, economic justification, and manageability.
Prerequisites:
Admission to MS Information Technology Management Program and ITM 710.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 725Enterprise Security3.00
Students will explore the technical, administrative, and physical aspects of IT security. They will investigate various threats within IT and fraud and apply information classification to the design of information, network and physical security. Students will evaluate the business processes of risk, business continuity, audit, and the risk within software development.
Prerequisites:
Admission to the MS Information Technology Management program and ITM 700
Typically Offered:
Fall, Spring, and Summer Terms
ITM 730Agile and Traditional IT Project Management3.00
This course examines project management concepts as applied to IT projects and covers traditional PMBOK techniques such as project identification, selection, procurement, and cost/schedule preparation and monitoring. Students will be introduced to agile IT project management concepts including Scrum and Extreme Programming. This course requires students to apply these concepts to group projects.
Prerequisites:
Admission to MS Information Technology Management Program and ITM 700 and 710.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 735Business Analysis and System Development3.00
This course focuses on the importance, role, and techniques of the business analysis function in the modern IT organization. This course is organized around the six knowledge areas and associated techniques of the Business Analysis Body of Knowledge (BABOK) specified by the International Institute of Business Analysis.
Prerequisites:
Admission to the MS Information Technology Management program and ITM 730.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 740IT Operations3.00
This course explores best practices and techniques for ensuring the smooth functioning of the IT infrastructure and operational environments to support development and deployment of applications and services within the organization. Coverage includes network infrastructure; servers and devices; computer operations; service management; facilities; help desk services, DevOps, and process automation.
Prerequisites:
Admission to the MS Information Technology Management program and ITM 735.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 745IT Governance, Ethics, and Regulatory Compliance3.00
This course examines best practices in IT governance to achieve regulatory compliance, optimize use of available resources, ensure trustworthiness of enterprise information, and support business strategies and objectives. Topics include: strategic alignment, IT service and control frameworks, portfolio management, IT risk management, and ethical issues in IT governance.
Prerequisites:
Admission to the MS Information Technology Management program and ITM 735
Typically Offered:
Fall, Spring, and Summer Terms
ITM 750Evaluation of Emerging Technologies3.00
This seminar course researches, identifies and evaluates significant new trends, technologies and events influencing the global environment of information technology and systems. The course will evaluate future and disruptive technologies, strategies for successful implementation of innovative technologies, critical thinking, and ethics pertaining to its use
Prerequisites:
Admission to the MS Information Technology Management program and ITM 740.
Typically Offered:
Fall, Spring, and Summer Terms
ITM 754Capstone Preparation1.00
Students select their capstone project, create a plan, define deliverables, secure approval and complete setup of their development environment. Students review concepts necessary for completion of the capstone including Agile project management, systems analysis and communicating with technical and non-technical audiences. Additional topics may be included.
Prerequisites:
Admission to MS in Information Technology Management program
Typically Offered:
Fall, Spring, and Summer Terms
ITM 755Capstone3.00
In this course, students complete the projects approved in the Capstone Preparation course. This course includes the management, development and delivery of an information technology project to a client or employer, including regular communication of status to both technical and non-technical audiences
Prerequisites:
Admission to the MS Information Technology Management program and ITM 754
Typically Offered:
Fall, Spring, and Summer Terms
 
MATH - Mathematics
Catalog Nbr.Course Title/Course TopicsCredits
MATH 681Special Topics1.00 - 4.00
In-depth study of specialized current topics in mathematical sciences. May be repeated when topics are different.
Typically Offered:
Occasional by Demand

Mathematics and Computer Science Department Contact Information Top of Page

Mathematics and Computer Science Department
University of Wisconsin - Superior
Swenson Hall 3030
Belknap and Catlin Ave.
P.O. Box 2000
Superior, WI 54880
Phone: 715-394-8028
Email: math-csci@uwsuper.edu