Cybersecurity Courses
Sign In
This area will be filled in by content you create in your page layouts.

Requirements

The Master’s degree requires 30 credits, the LL.M. 24 credits, and the Certificate program 9 credits. To earn a concentration at least 18 credits must be completed from courses within the concentration. The Master’s and LL.M. require a Thesis course and the Master’s requires Introduction to Law and Legal Methods. That leaves room for either completing additional courses within the concentration or taking some electives. The programs are built for flexibility.

  • Title
  • Credits
  • This course is designed to expose students to the issues involved in cybersecurity law, both from a national policy standpoint and from a corporate counsel view. Cybersecurity is the protection of electronic data and systems from attack, loss, or other compromise. Electronic data and systems include governmental records, and investor and private firm information, and the hardware and software systems used to generate and maintain that data.

  • This course examines the impact of technology on information privacy law, while examining the evolution of the right to information privacy and personal autonomy under Constitutional, tort, statutory and international law. This course will explore how the law should balance privacy rights with national security concerns, given the advent of new technologies and information structures. This course will examine modern privacy developments involving, inter alia, social media, video surveillance, “big data” practices, DNA databanking, the collection of health information, cybersecurity, airport body scanning, drone technology, and Internet privacy and cryptography. This course is required to complete the Concentration in Law and Cybersecurity.

  • This course introduces students in the M.S in Legal Studies program to the basics of the U.S. Legal System, including the structure of the federal courts, use of precedent, and methods of reading, analyzing and synthesizing case law. Basic terminology and principles of common law subjects - including torts, contracts and property - are introduced and explored through case law readings. In addition, the course will provide experience in the research and writing skills necessary for effective legal analysis and clear oral and written communication, including hands-on experience using Schaffer Law Library and electronic resources.

  • This graduate-level course examines global data protection and privacy issues, with particular focus on the balance between an individual’s control of his/her personal information and the right of others to collect and use the individual’s personal information. The aim of the course is to understand the cultural, social, economic and political factors that influence data privacy and data protection laws around the world, including the European Union, Russia, China, Australia and Canada. The course will examine issues that include collection of data for commercial and governmental purposes, including but not limited to marketing. Attention will be paid to the new European General Data Protection Regulation, new data localization laws in China and Russia, and other current developments. US data privacy law will be addressed only in comparison to non-US approaches. Note: This course does NOT focus on US data privacy, which is instead the focus of Technology Privacy and the Law.

  • This course examines privacy as an individual's right under the law to have the freedom to make both meaningful decisions, and control the use of personal information held by others. The course will explore how the law protects privacy rights in online environments, with particular regard to web technologies and digital advertising. The course examines today's information security and data breach laws, including notification requirements at both the federal and state level. We will read and discuss materials designed to increase your understanding of medical privacy laws, such as 42 CFR Part 2, HIPAA, GINA, and the 21st Century Cures Act of 2016, so that you can gain an appreciation for how personal protected health information must be maintained and secured.

    We will examine the financial privacy laws that control how your credit report and banking information can be used, such as FCRA, FACTA, and GLBA, and how the government and commercial entities collaborate to ensure the safe use and accuracy of your virtual assets. Lastly, the course will address the protections afforded to educational records by laws such as FERPA and the PPRA, and how such laws are enforced in the local, regional, and collegiate educational systems. The last part of the course will explore emerging issues in the area of individual privacy law, such as Big Data, surveillance, and the Internet of Things, and how these emerging technologies are quickly becoming key aspects to being well-informed, and capable of providing meaningful consent to data use.

  • This course primarily focuses on the intersection of U.S. public policy and cybersecurity at the local, state, and federal levels, broadly covering e-government and policy implications as viewed through a constitutional lens.

  • This focused survey course examines U.S. privacy laws in several significant contexts, including (1) telecommunications and marketing, (2) workplace and employment, and (3) civil litigation and governmental law enforcement investigations. The course will explore how commercial marketing activities that involve telemarketing and email are regulated, and we'll examine laws such as the CAN-SPAM Act, the CCPA, and the VPPA to understand how they are intended to protect consumers. We will examine the privacy concerns that affect employees in the workplace, both private and public, and identify those areas that are important for prospective employers and employees alike to be aware of in today's work environment. Where civil litigation and government investigations affect specific privacy concerns for individuals, the course will examine to what degree disclosures and discovery are allowable in the civil litigation context, and will review the roles of privacy professionals in the realms of law enforcement and national security. Lastly, the course addresses emerging issues in the topics covered throughout the class, and will consider insight and reflections from industry practitioners to equip students with actionable, relevant, and timely concepts by which to evaluate current or future privacy policies.

  • This is the capstone course for the cybersecurity and privacy program. Students successfully completing this course will generate real-world cybersecurity documents including: a risk assessment, risk management strategy, needs analysis, GAP analysis, and risk treatment plan. This graduate-level course outlines the challenges surrounding critical infrastructure sector security and explains how implementing a security program based on the different cybersecurity frameworks can help organizations mitigate these issues. Students will critique the strengths and weaknesses of frameworks such as the NIST Cybersecurity Framework, COBIT 5, NIST 800-53, ISO 270001, and CIS critical security controls for cybersecurity.

  • This course exposes students to management practices for assessing the risk of cybersecurity in the supply chain across many industries and processes. Supply chain processes account for a significant portion of a company's costs ultimately resulting in delivery of goods or services to customers. Critical supply chain metrics and processes are required to make supply chain decisions. The Course will also investigate topics, such as vendor supply chain design logistics and security planning. Threats to the global supply chain are significant and costs billions of dollars per year. The Course will examine the cybersecurity threats to the supply chain and develop risk strategies in working with vendors as part of the supply chain. Key issues include organizational cyber intrusion incident response planning in the supply chain, developing a risk planning methodology, and cost associated with corporate breaches.

  • Credits: 3

    This course is designed to provide students with an overview of the legal, social, and technical impact of global "cybercrime." Cybercrime is loosely defined as a set of illegal activities that are facilitated through the use of computers or other technology devices. Examples of cybercrime include not only "traditional" crimes (e.g. identity theft or stalking) being carried out in a new medium, but a new set of activities in which the computer or computer network itself is a target of the attack. Topics will include the various state, federal and international laws, investigative measures and techniques used to identify, investigate, arrest and prosecute cybercriminals and cyberattacks, and the preventive measures that can be utilized to provide a secure environment for computer hardware and software. Active elements of the cyber underworld, including organized crime, terrorists and state sponsored activity, will be discussed. Students will become familiar with legal processes they may find themselves a part of, litigation, depositions and expert reporting. In addition, this course will address issues impacting the Fourth Amendment, forensics, electronic surveillance, computer hacking and cracking, intellectual property crimes, espionage, cyberterrorism, privacy, "forced disclosure," and the challenge of cross-jurisdiction enforcement.

  • Credits: 3

    ​Focuses on the legal requirements of electronic commerce including issues of electronic contracting, tort, defamation, constitutional law, intellectual property, procedural, domestic and international conflicts and regulation.

    Students who have taken Internet Law will not receive credit for this class.

Sample of elective courses (email graduateadmissions@albanylaw.edu for more information.)

  • Financial markets are rapidly changing, and new products, strategies, and investment vehicles are popping up everywhere. This course will examine emerging products, strategies and technologies such crypto currency, blockchain and initial coin offerings; algorithmic trading; high frequency trading; new digital payment systems; and robo advisors, with a focus on what the future of the industry holds and how we can prepare today for future developments.

  • This course allows students to explore multiple layers of HIPAA compliance as it covers the entities and information to which HIPAA applies, consent, types of health information requiring heightened protection, individual rights required under the Privacy Rule and administrative, physical and technical safeguards under the Security Rule. Classroom exercises give students the opportunity to apply newly obtained knowledge to facts and analyze whether the situation meets the standards for compliance with HIPAA. Upon completion of this course, students will have an in-depth understanding of the federal law designed to protect the privacy and security of health information.

  • This course explores the legal aspects of health care compliance. At both the federal and state levels, the course addresses the statutory, regulatory, and case law that comprises the complex legal backdrop in which the healthcare industry operates. The course introduces the history, purpose, and substance of healthcare regulatory compliance programs and addresses legal doctrines concerning protected information, patient's rights, HIPAA security and breach, compliance issues in healthcare business transactions, and special topics related to substance use, mental health, HIV, genetic information, and minors.

  • This course focuses on the critical function of Compliance Officers at financial institutions. The legal framework and strategies relevant to the position will be explored. This includes supervision, risk management, Extraterritorial application, and a discussion on the Committee of Foreign Investments in the United States.