CYS 501 Fundamentals of CyberSecurity
Credits: 3 (3-0-0) Prerequisites: None
This is a broad introductory course to CyberSecurity that covers a wide range of topics including security principles, authentication, cryptography, operating systems security, security models, software security, network security, …etc. The students will be asked to conduct some research and execute.
CYS 502 Foundations of Cryptography
Credits: 3 (3-0-0) Prerequisites: None
A deep introduction to cryptography and cryptographic algorithms and applications to computer and network security. Topics covered include Symmetric key cryptography, Public Key Cryptography, hashing algorithms, pseudo randomness, perfect secrecy, computationally secure algorithms.
CYS 503 Privacy in a Digital Networked World
Credits: 3 (3-0-0) Prerequisites: None
This course concentrates on privacy issues in the context of global connectivity. It starts by discussing the relation between privacy and security and describes the reality in today’s world where almost everybody is connected to some sort of network. It then develops a framework to reason about privacy, followed by measures to protect privacy at all levels.
CYS 504 Threats, Exploits and Countermeasures
Credits: 3 (3-0-0) Prerequisites: CYS502
This course covers in depth the types of threats, vulnerabilities and the types of attacks that may arise through exploits. It describes approaches to discover vulnerabilities and protect systems against threats and attacks. It also covers penetration testing, exploits, secure coding techniques, cryptographic attacks, infrastructure threats and countermeasures for all types of attacks.
CYS 505 Enterprise Security Architecture
Credits: 3 (3-0-0) Prerequisites: CYS501
This course introduces cybersecurity architecture concepts and practices using organizationwide enterprise architecture as context. The purpose of a cybersecurity architecture is to ensure that proper levels of information confidentiality, integrity, and availability are provided for an organization›s information, data, and related assets. The course will show how implementation of a cybersecurity architecture can be based on a Security Architecture Framework that addresses eight key cybersecurity areas to address enterprise and system-level information sharing and safeguarding requirements: information security governance, operations security, personnel security, information and data security, systems security, application development security, infrastructure security, and physical security.
CYS 506 Database Security
Credits: 3 (3-0-0) Prerequisites: CYS504
This course gives an overview of security challenges in all types of databases and covers some of the major topics like access control, database integrity, digital watermarking, security of distributed database systems.
CYS 513 Wireless and Mobile Security
Credits: 3 (3-0-0) Prerequisites: CYS505
The course represents an advanced course of security in mobile and wireless networks. This course will address various issues (attacks and defense strategies) in wireless and mobile security, including WEP and WPA, wireless jamming attacks, and mobile privacy. It is intended for Master students who are interested in the current development of wireless and mobile security. The goal of this course is to familiarize students with the issues and technologies involved in designing a wireless and mobile system that is robust against various attacks. Students will gain an understanding of the various ways in which wireless networks can be attacked and tradeoffs in protecting networks. At the end of this course, student will have a broad knowledge of the state-of-the-art and open problems in wireless and mobile security, thus enhancing their potential to do research or pursue a career in this rapidly developing area.
CYS 517 CyberSecurity Forensics
Credits: 3 (3-0-0) Prerequisites: CYS503
Provides a general introduction to Cybersecurity Forensics explaining how data and evidence may be collected and analyzed. It describes techniques for evidence acquisition, traffic analysis, event log analysis. The course also touches on intrusion detection, malware forensics analysis and web proxies.