{"id":428,"date":"2016-10-24T14:39:39","date_gmt":"2016-10-24T14:39:39","guid":{"rendered":"http:\/\/blogs.uml.edu\/ctss\/?p=428"},"modified":"2017-01-18T21:44:14","modified_gmt":"2017-01-18T21:44:14","slug":"spring-2017-courses-in-security-studies","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/ctss\/2016\/10\/24\/spring-2017-courses-in-security-studies\/","title":{"rendered":"Spring 2017 Courses in Security Studies"},"content":{"rendered":"<p>The following is a list of on campus and online courses offered in Spring 2017 that can be used to fulfill degree requirements for the MA or MS in Security Studies. <span style=\"text-decoration: underline\">Of course, some electives cannot be used for certain concentrations (like the MS in Cybersecurity concentration which requires a specific set of IT and Computer Science courses<\/span>). Please refer to your individual program of study, specific to your chosen Concentration within the degree program, for further guidance. Also, where &#8220;permission required&#8221; is indicated, please contact the instructor and the Security Studies program coordinator to discuss before attempting to enroll.<\/p>\n<p><strong>ON CAMPUS COURSES<\/strong><\/p>\n<p>CRIM.5910 Research Design<br \/>\nDr. Jason Rydberg<br \/>\nMondays 5-7:50pm<\/p>\n<p>CRIM.6890 Special Topics:\u00a0 Seminar in Transnational Crime Networks\u00a0 (permission required)<br \/>\nDr. Sheldon Zhang<br \/>\nMondays 5-7:50pm<\/p>\n<p>CRIM.6900 Advanced Regression Analysis<br \/>\nDr. Jason Rydberg<br \/>\nThursdays 5-7:50pm<\/p>\n<p>CRIM.7100 Advanced Research in Terrorism (permission required)<br \/>\nDr. Arie Perliger<br \/>\nTuesdays 5-7:50pm<\/p>\n<p>PCST.5080 Theories of Political and Criminal Violence<br \/>\nDr. Angelica Duran-Martinez<br \/>\nWednesdays 3:30 to 6:20pm<\/p>\n<p>BIOL.5720 Virology (permission required)<br \/>\nDr. Michael Graves<br \/>\nTues\/Thurs 9:30-10:45am<\/p>\n<p>ENGY.5070 Reactor Engineering and Safety (permission required)<br \/>\nDr. Dean Wang<br \/>\nMon\/Wed 2:00-3:15pm<\/p>\n<p>GLST.7012 Conflict, Cooperation, Security and Human Rights<br \/>\nDr. Jenifer Whitten-Woodring<br \/>\nWednesdays 3:30 to 6:20pm<\/p>\n<p>GLST.7170 Developing Economies<br \/>\nDr. John Wooding<br \/>\nTuesdays 3:30 to 6:20pm<\/p>\n<p>PUBH.5030 Toxicology and Health\u00a0 (permission required)<br \/>\nDr. Dhimiter Bello<br \/>\nMondays 3:30-6:20pm<\/p>\n<p>PUBH.5750 Introduction to Epidemiology\u00a0 (permission required)<br \/>\nDr. Natalia Palacios<br \/>\nWednesdays 3:30-6:20pm<\/p>\n<p>PUBH.6161 Exposure and Risk Assessment\u00a0 (permission required)<br \/>\nDr. Margaret Quinn<br \/>\nWednesdays 3:30-6:20pm<\/p>\n<p>PUBH.6191 Measurement of Chemical Exposure\u00a0 (permission required)<br \/>\nDr. Susan Woskie<br \/>\nTuesdays 3:30-6:20pm<\/p>\n<p><strong>ONLINE COURSES<\/strong><\/p>\n<p>CRIM.5750 Contemporary Security Studies<br \/>\nDr. Charles Kirchofer<\/p>\n<p>CRIM.5720 Comparative Terrorism and Counterterrorism<br \/>\nDr. James Forest<\/p>\n<p>CRIM.5780\u00a0 Intelligence Analysis Policy and Practice<br \/>\nMr. Chris Hickey<\/p>\n<p>CRIM.5660 Transportation Systems Safety and Security<br \/>\nMr. Gary Gordon<\/p>\n<p>CRIM.5730 Threat Assessment and Risk Management<br \/>\nDr. Jarret Brachman<\/p>\n<p>CRIM.5740 Overview of Homeland Security<br \/>\nDr. Tim Croft<\/p>\n<p>CRIM.5900 Descriptive &amp; Inferential Statistics<br \/>\nDr. Jason Rydberg<\/p>\n<p>CRIM.5910 Research Design<br \/>\nDr. Kareem Jordan<\/p>\n<p>CRIM.6500 Violence in America<br \/>\nDr. Carol Higgins-O\u2019Brien<\/p>\n<p>CRIM.6580 Issues in Computer Crime and Cyber Security<br \/>\nMr. Scott McGann<\/p>\n<p>CRIM.6680 Scientific &amp; Technological Dimensions of National Security<br \/>\nDr. David Boyd<\/p>\n<p>CRIM.6660 Terrorism Networks<br \/>\nDr. Arie Perliger<\/p>\n<p>CRIM.6990 Capstone Research Paper\/Project<br \/>\nDr. James Forest<\/p>\n<p>MSIT.5140 Systems Security and Auditing<br \/>\nDr. Thomas Cummings<\/p>\n<p>MSIT.5450 Designing and Building a Cybersecurity Program<br \/>\nDr. Lawrence Wilson<\/p>\n<p>MSIT.5620 Computer Network Security<br \/>\nDr. Jie Want<\/p>\n<p>MSIT.5620 Digital Forensics<br \/>\nDr. Xinwen Fu<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a list of on campus and online courses offered in Spring 2017 that can be used to fulfill degree requirements for the MA or MS in Security Studies. Of course, some electives cannot be used for certain &hellip; <a href=\"https:\/\/blogs.uml.edu\/ctss\/2016\/10\/24\/spring-2017-courses-in-security-studies\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":35,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/posts\/428"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/comments?post=428"}],"version-history":[{"count":4,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/posts\/428\/revisions"}],"predecessor-version":[{"id":437,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/posts\/428\/revisions\/437"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/media?parent=428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/categories?post=428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/ctss\/wp-json\/wp\/v2\/tags?post=428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}