Courses

Course List:

Undergrad security courses  (All undergrad courses are only taught on campus unless noted)

Undergrad courses under development:

  • Wireless security

Graduate courses:

Course Descriptions:

 

CPR E 131. Introduction to Computer Security Literacy.

Credits: 1
PreReqs: None

Syllabus: 131-syl

Basic concepts of practical computer and Internet security: passwords, firewalls, antivirus software, malware, social networking, surfing the Internet, phishing, and wireless networks. This class is intended for students with little or no background in information technology or security. Basic knowledge of word processing required. Offered on a satisfactory-fail basis only.
Top of Page


Cpr E 230 Cyber Security Fundamentals

Credits: 3

Prerequisites: Credit in MIS 207 or CS 227 or EE 285

Syllabus: CprE_230

Introduction to computer and network infrastructures used to support cyber security. Basic concepts of computer and network configuration used to secure environments. Computer virtualization, network routing and address translation, computer installation and configuration, network monitoring, in a virtual environment. Laboratory experiments and exercises including secure computer and network configuration and management.
Top of Page


Cpr E 231 Cyber security concepts and tools

Credits: 3
PreReqs:  ComS 107 or 207, or 227, or EE 285

Syllabus: CprE_231

Basic concepts of practical computer and Internet security and the tools used to protect and attack systems and networks. Computer and network security methods including: user authentication, access control, firewalls, intrusion detection, use of vulnerability assessment tools and methods, and penetration testing. Ethics and legal issues in cyber security will also be covered. Laboratory experiments and exercises including evaluating systems for vulnerabilities, understanding potential exploits of the systems, and defenses for the systems.
Top of Page


Cpr E 234 Legal, Professional, and Ethical Issues in Cyber Systems

Credits: 3

Prerequisites: credit in Com S 227, or EE 285, or MIS 207

Syllabus: CPR E 234X Syllabus

The course emphasizes legal, ethical, and professional issues in cyber systems. Other topics include privacy, government regulation, and compliance as applied to professional practice. The course is delivered in a lecture plus a 2 hour recitation in a seminar format with guest lecturer from government and industry, as well as discussions including current legal and ethical issues found in the main stream.

Top of Page


Cpr E 331 Application of Cryptographic Concepts to Cyber Security

Credits: 3

Prerequisites: Credit in CPR E 231

Syllabus: CprE_331

This course provides students with the basic cryptographic underpinnings used in modern cyber security encryption suites. The focus of the class is on how encryption benefits cyber security and is used in protocols. Additional topics include cryptographically secure hash functions and pseudorandom numbers, as well as key distribution techniques, secure authentication including single sign on. Detection and prevention of security threats such as covert communication, malicious code, and other security threats in protocols are included. In addition to laboratory experiments and exercises, students complete a project focused on cyber security problem and solution. (2-2) Cr. 3
Top of Page


InfAs 332 Cyber Defense Competition.
Credits: 1
PreReqs: None

Syllabus: 332-syl

(Cross-listed with Cpr E) Participation in cyber defense competition. Scenario based computer system setup, risk assessment and design of security systems. Defense of computer and network systems against trained attackers. Team based.   Offered on a satisfactory-fail basis only.
Top of Page


Cpr E 431 Basics of Information System Security
Credits: 3

PreReqs: Credit or enrollment in CPR E 308 or COM S 352

Syllabus 431-syl
Introduction to and application of basic mechanisms for protecting information systems from accidental and intentional threats. Basic cryptography use and practice. Computer security issues including authentication, access control, and malicious code. Network security mechanisms such as intrusion detection, firewalls, IPSEC, and related protocols. Ethics and legal issues in information security.  Wireless security. Programming and system configuration assignments.
Top of Page


Cpr E 432 Cyber Security Practicum

Credits 3

PreReqs:  Cpr E 331

Syllabus: CprE_432_Syllabus

This course focuses on the design and implementation of a secure networked environment that will be penetration tested by other peers in the course.  Evaluations will be made of each environment and whether it withstood testing and what vulnerabilities were able to be exploited.  After this attack phase, students will complete an evaluation of their security plans and take the necessary remediation steps to further harder their networked environment.  The lecture will target the tactics needed to be taken by the students in their weekly lab practicum.  In addition to using technical skills, students will use their technical writing skills in their design documents, implementation plans, and post-mortem security evaluations.

Top of Page

CPR E 440X. Operating System Security.

Credits:3

Prereqs: CPR E 308 OR COM S 352.

Syllabus: 440 syllabus

Focus on fundamentals and advanced topics in operating system (OS) security. Design issues, principles, mechanisms, and good practice for design and implementation of secure computer/OS systems. Threat models, vulnerabilities, attacks compromise security, and advanced OS-level techniques for achieving security. Topics include OS security concepts and principles, seminal security in Multics, vulnerabilities in ordinary systems, secure capability systems, information flow control, mandatory access control, security kernels, memory protection, file system, virtual machine systems, hardware/architecture support (e.g., Intel SGX) for OS security, secure microkernel OSes (e.g., seL4, QNX), modern mobile operating systems (e.g., Android and iOS), and security from end-user perspective. Assignments include labs exploring and implementing the technologies in the context of the Linux, Android, and seL4 systems (some involving kernel programming).

Top of Page


ComS 453X Privacy Preserving Algorithms and Data Security
Credits: 3

PreReqs: COM S 311

Syllabus:

Fundamentals of privacy preserving algorithms, data security, anonymization, and techniques and mechanisms to minimize disclosure of sensitive information while maintaining availability. Theory and fundamentals underpinning measures to evaluate the privacy and availability of data; implementation and deployment of privacy-preserving data operations including pre- and post-randomization techniques, homomorphisms, and secure function evaluation protocols. Theory and practice of the algorithmic limits on data privacy, including the cost in terms of time and space complexity.
Top of Page


InfAs 530 Advanced Protocols and Network Security
Credits: 3

PreReqs: CprE 381

Syllabus:  530-syl

(Cross-listed with Cpr E) Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols, IP routing, network security issues, attacks, and mitigation techniques.  Emphasis on laboratory experiments.
Top of Page


InfAs 531 Information System Security
Credits: 3

PreReqs: CprE 489 or 530 or Com S 586 or MIS 535

Syllabus: 531-syl

(Cross-listed with Cpr E) Computer, software, and data security: basic cryptography, security policies, multilevel security models, attack and protection mechanisms, legal and ethical issues.
Top of Page


InfAs 532 Information Warfare
Credits: 3

PreReqs: CprE 531

Syllabus: 532-syl

(Cross-listed with Cpr E) Computer system and network security implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures.  Study and use of attack tools. Ethics in information assurance. Emphasis on laboratory experiments.
Top of Page


InfAs 533 Cryptography
Credits: 3

PreReqs: MATH 301 or CprE 310 or ComS 330

Syllabus: 533-syl

(Cross-listed with MATH, Cpr E) Basic concepts of secure communication, DES and AES, public-key cryptosystems, elliptic curves, hash algorithms, digital signatures, applications. Relevant material on number theory and finite fields.
Top of Page


InfAs 534 Legal and Ethical Issues in Information Assurance
Credits: 3

PreReqs: Graduate classification, CprE 531 or InfAs 531

Syllabus: 534-syl

(Cross-listed with Cpr E, POL S) Legal and ethical issues in computer security. State and local codes and regulations. Privacy issues.
Top of Page


InfAs 535 Steganography and Digital Image Forensics
Credits: 3

PreReqs:  EE 524 or MATH 317 or MATH 407 or COM S 330

Syllabus: 535-syl

(Cross-listed with Cpr E, MATH) Basic principles of covert communication, steganalysis, and forensic analysis for digital images. Steganographic security and capacity, matrix embedding, blind attacks, image forensic detection and device identification techniques. Related material on coding theory, statistics, image processing, pattern recognition.
Top of Page


InfAs 536 Computer and Network Forensics
Credits: 3

PreReqs: CprE 489 or Cpr E 530

Syllabus: 536-syl

(Cross-listed with Cpr E) Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments.
Top of Page


 Cpr E 537 Wireless Network Security  (not offered at this time)
Credits: 3

PreReqs: Credit or enrollment in Cpr E 489 or Cpr E 530

Syllabus: 537-syl

Introduction to the physical layer and special issues associated with the security of wireless networks. The basics of wireless communication systems (antennas and propagation, modulation, multiple access, channel modeling, specific security issues of the wireless link), jamming and countermeasures (spread spectrum technologies, channel coding, interleaving), authentication and confidentiality (basics of classic cryptography, common authentication and encryption algorithms). Detailed case studies on authentication, encryption and privacy flaws, and good practices based on the most common wireless technologies, including WiFi, GSM/3G, Bluetooth, and RFID. Individual or team-based class projects.
Top of Page


Cpr E 538 Reverse Engineering and Security Testing
Credits: 3

PreReqs: COM S 321 or CPR E 381, COM S 352 or CPR E 308

Syllabus 538-syl
(Cross-listed with INFAS). Techniques and tools for understanding the behavior of software/hardware systems based on reverse engineering. Flaw hypothesis, black, grey, and white box testing as well as other methods for testing the security of software systems. Discussion of counter-reverse engineering techniques.
Top of Page


Cpr E 539 Cyber Physical System Security for the Smart Grid
Credits: 3

PreReqs:  None

Syllabus 539-syl
Introduction to cyber security, cyber physical system (CPS), and smart grid automation technologies; supervisor control and data acquisition (SCADA) systems; cyber risk modeling, vulnerability analysis, impact analysis, defense and mitigation techniques; cyber security of wide-area monitoring, protection, and control; security and privacy in advanced metering infrastructure (AMI), cyber security compliance and best practices, CPS security test-beds and attack-defense hands-on laboratory experiments.
Top of Page


COM S 559X. Security and Privacy in Cloud Computing
Credits: 3

PreReqs:  Com S 352 or Cpr E 308, and Com S 486 or Cpr E 489 or Cpr E 530

Syllabus
(Cross-listed with Cpr E 559X) Overview of cloud computing models, security and privacy threats in cloud computing related to data and computation outsourcing, theoretical results and practical techniques for secure cloud computing and its applications.
Top of Page


CPR E 560X. Data-Driven Security and Privacy
Credits: 3.

PreReqs: Cpr E 531, COM S 474 or COM S 573

Syllabus:

(Cross-listed with COM S 560X and InfAs 560X) Examination of applications of machine learning and big data techniques to various security and privacy problems, as well as secure and privacy-preserving machine learning algorithms.
Top of Page


Cpr E 562X Secure Software Engineering

credits: 3

Prerequisite: CprE 308 or ComS 352

Syllabus: CprE 562X Syllabus

Fundamentals and techniques to design and implement software systems. Assessment of security vulnerabilities in software systems, exploitation of software vulnerabilities, and methods to secure vulnerable software. Secure coding practices, data analytics for security, microservices and cloud services security. Reverse engineering and security assessment of cyber physical systems..


CPR E 631X. Cyber Security Operations Practicum
Credits: 3.

PreReqs: Cpr E 532, Cpr E 534, and permission of instructor

Syllabus:

(Cross-listed with INFAS) Practical experience in cyber operations. Cyber security threat analysis, malware analysis, and intrusion detection management. Cyber security data analysis methods. Pen testing tools and techniques. Weekly threat analysis briefings.
Top of Page


InfAs 632 Information Assurance Capstone Design
Credits: 3

PreReqs: 531, 532, 534

Syllabus: 632-syl

(Cross-listed with Cpr E) Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attach each other’s secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report, and an oral report.
Top of Page


InfAs 634X Current Research Problems in Cyber Security
Credits: 3

PreReqs: 530, 531, permission of instructor

Syllabus: 

Discussion of national cybersecurity/information systems security problems. Students will learn how to apply research techniques, think clearly about these issues, formulate and analyze potential solutions, and communicate their results. Working in small groups under the mentorship of technical clients from government and industry, each student will formulate, carry out, and present original research on current cybersecurity/information assurance problems of interest to the nation. This course will be run in a synchronized distance fashion, coordinating some activities with our partner schools and our technical clients.
Top of Page