Angela Orebaugh headshot

Angela D. Orebaugh

Assistant Professor
Unit: School of Engineering and Applied Science
Department: Department of Computer Science
Office location and address
Northern Virginia Center
85 Engineers Way
Charlottesville, Virginia 22903
M.S., Computer Science, James Madison University
Ph.D., Information Technology, George Mason University

As program director and assistant professor for the graduate Certificate in Cyber Security, Angela Orebaugh brings a broad spectrum of expertise in cyber security as a technologist, researcher, educator, and author. She synergizes 20 years of hands-on strategic and technical experiences within industry, academia, and government to perform leading-edge research and advise clients on cyber security strategy, management, and technologies. Orebaugh served as a Fellow and Senior Associate at Booz Allen Hamilton, where she led several cyber security initiatives and emerging technology areas. Additionally, she is the author of several bestselling technology books including: Wireshark and Ethereal Network Protocol Analyzer Toolkit, Ethereal Packet Sniffing and Nmap in the Enterprise. She has a Master of Science in Computer Science from James Madison University and a Ph.D. in Information Technology from George Mason University.

LASE 2559: New Course in the Liberal Arts
Credits: 1–6
This course provides the opportunity to offer a new topic in Liberal Arts Seminars.
SEC 3010: Securing the Cyber World
Credits: 3
Provides a global perspective on cyber security and the impact of cyber threats. Addresses a variety of topics that are all part of the cyber ecosystem, to include current threat trends, defense in-depth techniques, attack case studies, risk management, disaster recovery, security policy, and awareness training. Examines current best practices, compliance requirements, and evolving security architectures.
SEC 3020: Cyber Security Policy, Law, and Ethics
Credits: 3
Provides overview of cyber security (CS) policies, laws, regulations, and ethical considerations that can be used to help protect and improve an organization's security posture. Explores related topics including ethics, CS policy requirements and controls, compliance, and implementation issues. Examines modern CS regulations and frameworks, and the various policies and procedures that may be used in an organization's security strategy.
SEC 3030: Human Factors in Cyber Security
Credits: 3
Explores human aspects of cyber security -- including security training and awareness, cyber ethics, hacktivism, hacker culture -- with emphasis on human motivations and responses. Examines common human-centered attacks, such as phishing, social engineering, and other psychological manipulation.
SEC 3040: Writing and Communication in a Technical Field
Credits: 3
Develops strong writing competencies for technical fields, including communication of complex information to a variety of audiences through various print and online media. Teaches students to write, organize, edit, and design information with clarity and accuracy. Covers organizing, managing, communicating, and facilitating technical information. Topics include conciseness, simplicity, information arrangement, presentation, and readability.
IT 3210: Programming with Java
Credits: 3
Studies key structures, concepts, and applications needed to write programs with Java, an object-oriented programming language used for developing user interfaces on the Web.
IT 3220: Strategic Business Value of Information Technology
Credits: 3
Focuses on how to assess the value of IT investments and align technical strategies with business strategies. Introduces Porter's Five Forces Model, the value chain, technology payoff metrics, and risk analysis. Explores ways to leverage disruptive technologies for competitive advantage.
IT 3230: Basics of Web Design
Credits: 3
Master the basics of website construction, design, and maintenance using XHTML and CSS. The course provides an overview of aesthetic, business, and technical website design concepts. Attention is also given to the underlying concepts of website design such as navigation for websites, usability, accessibility issues, and the process of putting a completed website online.
IT 3240: Enterprise Systems Architecture and Design
Credits: 3
Applies common frameworks and methodologies to the examination of enterprise system architecture needs. Includes coverage of the systems development life cycle and the methodologies in use characterized by their varying degrees of iteration, structure, and user involvement. Emphasizes analytical and design concepts and related tools such as use cases and Unified Modeling Language.
IT 3350: Agile Project Management
Credits: 3
Introduces the principles of Agile Project Management and covers the frameworks and practices used by agile teams. Explores innovative ways of gathering requirements, estimation, release planning, performance metrics, and scaling with the Agile Manifesto in mind. Emphasizes software development while applying the principles to any type of project..
IT 3400: Database Management and Business Intelligence/Analytics
Credits: 3
Learn and apply the fundamentals of relational database modeling and database management systems technology in the development of business information systems. Encompasses entity/relationship diagrams, relational theory, normalization, integrity constraints, the Structured Query Language (SQL), and physical and logical design. Students will also be exposed to core concepts and tools associated with data warehousing.
ISSS 3401: Smart Cities Enabling Sustainability
Credits: 3
Introduces smart cities within the context of sustainability: economic, environmental, and equity. Provides a multidisciplinary look at innovative smart city approaches to solve complex problems on the local level with global impact; includes topics from environmental studies, information technology, data science, engineering, and social science.
CS 3710: Introduction to Cybersecurity
Credits: 3
Introduces students to the fields of cybersecurity. Both non-technical issues, such as ethics and policy, and technical issues are covered. Students see and experiment with a wide range of areas within cybersecurity, including: binary exploitation, encryption, digital forensics, networks, and modern threats. Prerequisites: CS 2150 or CS 2501 topic DSA2 with a grade of C- or higher.
SEC 4010: Digital Forensics and Cybercrime
Credits: 3
Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime. Explores the threats of cybercrime and mitigating countermeasures. Topics include discovering, preserving, and presenting digital evidence for legal prosecution; digital forensics tools and techniques; and anti-forensics techniques.
SEC 4020: Mobile Security and Forensics
Credits: 3
Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.
SEC 4030: Ethical Hacking
Credits: 3
Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
IT 4400: Web Application Development - Building Dynamic Websites
Credits: 3
This course serves as a capstone course to be taken after all other required courses in the program. Using a project-based approach, students will develop Web applications using the PHP scripting language and MySQL databases. Topics include PHP scripting, data-driven interactivity, writing secure PHP programs, and code frameworks.
ECE 4457: Computer Networks
Credits: 3
A first course in communication networks for upper-level undergraduate students. Topics include the design of modern communication networks; point-to-point and broadcast network solutions; advanced issues such as Gigabit networks; ATM networks; and real-time communications. Cross-listed as CS 4457. Prerequisite:  CS 3330 or ECE 3430
CS 4501: Special Topics in Computer Science
Credits: 1–3
Content varies annually, depending on instructor interests and the needs of the department. Similar to CS 5501 and CS 7501, but taught strictly at the undergraduate level. Prerequisite: Instructor permission; additional specific requirements vary with topics.
ISHU 4850: Principles of Sustainability
Credits: 3
Provides an introduction to sustainability concepts within the framework of environment, economics, and equity. Covers foundational principles of sustainability and emerging topics, including population, energy, food, water and technology. Emphasizes the interrelationship between humans and the environment, and includes discussion of ecosystems, human behavior, ethics, and policy.
BUS 5010: Cyber Security Management
Credits: 3
Provides managers with the essential framework needed to design and develop an effective cyber security program. Explores methods used to raise general security awareness, review current industry practices, and develop expertise needed to adapt policies to achieve confidentiality, integrity, and availability of organizational assets and data.
BUS 5020: Security Policy Development and Assessment
Credits: 3
Examines the steps required in policy development including password protection, acceptable use of organization information technology assets, risk acceptance, identification of threats, countermeasures, intellectual property, proprietary info and privacy issues, compliance reporting, and escalation procedures. Discusses access controls, security standards, and policy implementation.
BUS 5030: Designing Dynamic Security Architecture
Credits: 3
Explores the building blocks needed to implement security within the System Development Life-Cycle (SDLC). Focuses on how to analyze internal applications, computing platforms/network infrastructure, and corporate objectives with an eye toward designing flexible security architecture that is best suited for the enterprise. Studies in-depth defense techniques and how they are applied to optimize security architecture.
BUS 5040: Creating and Conducting a Security Assessment
Credits: 3
Reviews the essential components of a security assessment and explores how to integrate methodology with company needs. Covers the pitfalls connected with conducting a security assessment. Addresses how to create security assessment reports, identifying threats and vulnerabilities and managing organizational audits and compliance metrics. Case studies are used to illustrate course concepts.
BUS 5050: Threat Assessment and Security Measures
Credits: 3
Learn how to anticipate and respond to threats using an arsenal of security tools, appliances, and devices including encryption, firewalls, intrusion detection systems, vulnerability assessment systems, single sign on, virtual private networks, and authentication systems. Includes implementing practical network security measures including the importance of hardening operating systems and applications to minimize vulnerabilities.
BUS 5060: Understanding Technology Used in an Open Access Environment
Credits: 3
Covers the technologies enabling the migration of computing applications, communications, and information to the cloud environment. Explores the technologies that facilitated back-end integration and front-end deployment. Reviews the information assurance challenges and popular solutions of cloud computing. Discusses communications concepts such as TCP/IP, ISP delivery channels, and wireless technology.
BUS 5100: Cyber Law, Regulation, and Ethics
Credits: 3
An overview of the ethical challenges in the information age - introduces the complex and dynamic state of the law as it applies to behavior in cyberspace. Topics include the legal pitfalls of doing business in an interconnected world and an intro to the various organizations and materials that can be turned to for assistance in understanding how to ethically and legally provide services and operate modern computer-based systems and networks.
BUS 5120: Securing the Internet of Things
Credits: 3
Examines the security and ethical issues of smart devices known as the Internet of Things (IoT). The IoT consists of smart devices that sense, anticipate, and respond to our needs as we manage them remotely. Explores IoT technology, security vulnerabilities and attacks, and mitigation controls. Assesses the health, safety, privacy, and economic impacts of IoT security events.
IT 5220: Strategic Business Value of Information Technology
Credits: 3
Focuses on how to assess the value of IT investments and align technical strategies with business strategies. Introduces Porter's Five Forces Model, the value chain, technology payoff metrics, and risk analysis. Explores ways to leverage disruptive technologies for competitive advantage. Application of various models and frameworks is achieved through assignment. Prerequisite: Admission to Graduate Certificate in HSM or Instructor Permission.
BUS 6000: Applied Wireless Network Security
Credits: 3
Provides students with practical, real-world experience with the various wireless network security core competencies. Specifically, the course provides the most popular hacking, cracking, and wireless security network analysis tools on a CD ROM and trains students to use them to assess and secure wireless networks.