Academic Catalog 2024–2025

jump to navigation

Courses

Back to All Disciplines

Cybersecurity Courses

CYS610 Cybersecurity Data Analytics

[3–0, 3 cr.]

Explores use of big data techniques to cybersecurity problems. Topics include cybersecurity, surveillance, behavioral prediction and manipulation, data sources, data collection techniques and tools, cybersecurity analytics infrastructure, machine learning and data mining, network forensics, anomaly and malware detection, security data visualization, and security dashboard design and implementation.

 

CYS611 Cybersecurity Law and Policy

[1–0, 1 cr.]

This course will provide students exposure to the key legal and policy issues related to cybersecurity. It includes such topics as data security laws and enforcement actions, cybersecurity litigation, anti-hacking laws, cybersecurity and corporate governance, privacy law, the Fourth Amendment, surveillance, and international cybersecurity law.

 

CYS612 AI for Cybersecurity

[2–0, 2 cr.]

This course introduces students to the fundamental concepts and models in Artificial Intelligence that can be applied to cybersecurity data and applications. Topics include analysis of computer viruses, network traffic, financial crime investigations, clustering user activities, and adversarial learning. Students will develop a robust understanding of machine learning’s capabilities and limitations in cybersecurity contexts, including insights into how adversaries use adversarial ML models to target ML-based security systems. The course will equip students with the skills to construct their own AI-based security tools and automate their workflows through the use of AI.

 

CYS613 Networks Programming

[1–0, 1 cr.]

This course covers methods and tools used for network programming and simulation. Covered topics include operating system support for network protocols, inter-process communication tools (such as pipes, sockets and remote procedure calls), and design of client and server sides of network protocols.

 

CYS616 Cryptography and Data Security

[3–0, 3 cr.]

This course is an advanced survey of modern topics of theory, foundations, and applications of modern cryptography. One-way functions, pseudo-randomness, encryption, authentication, public-key cryptosystems, and notions of security are covered. The course also covers zero-knowledge proofs, multiparty cryptographic protocols, and practical applications.

 

CYS621 Information Security

[3–0, 3 cr.]

This course prepares students to develop organizational information security programs and policies that follow recognized standards, comply with all governing laws and regulations, and meet the needs of the company culture and management organization. The course covers how to perform risk management institutionally, how to manage compliance to information security requirements, and how to delegate compliance, risk, and security functions to specific roles within the organization. It also helps learners apply strategic decision-making as companies adapt to new technologies, processes, and people practices related to processing, managing, and protecting information resources.

 

CYS622 Cloud Security

[3–0, 3 cr.]

This course teaches students to design security solutions for cloud-based platforms and operations that maintain data availability while protecting the confidentiality and integrity of information. Course topics include cloud service models, deployment methods, identity and access management (IAM) strategies, auditing and monitoring strategies, assessing and mitigating common cloud security threats, and managing compliance and regulation requirements. The course also offers hands-on experience deploying and assessing IAM controls in a cloud environment.

 

CYS623 Penetration Testing and Vulnerability Analysis

[3–0, 3 cr.]

This course introduces students to a wide range of topics related to ethical hacking and penetration testing. The topics cover the tools and penetration testing methodologies used by ethical hackers. The course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will immerse in a “Hacker Mindset” in order to teach them how to think like a hacker and defend against future cyber-attacks. Students will utilize hands-on applications of security techniques by employing systematic and ethical hacking processes in a professional manner. Various tools for scanning, penetration testing, and securing target systems will be demonstrated. The five phases of ethical hacking will be presented including reconnaissance, gaining access, enumeration, maintaining access, and covering tracks.

 

CYS631 Mobile and Wireless Security

[3–0, 3 cr.]

This course will address various issues (attacks and defense strategies) in wireless and mobile security, including WEP and WPA, wireless jamming attacks, and mobile privacy. Topic coverage will include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and cross-layer holistic attacks. Systems of interest include (but are not limited to) personal devices, connected vehicles, embedded and IoT systems, wireless infrastructure, and ad hoc networks.

 

CYS632 Secure Software Development

[3–0, 3 cr.]

This course focuses on the variety of elements needed to address and implement secure software acquisition and development throughout the software development life cycle (SDLC). The course addresses people, technology, tools, and processes to design and develop consistently secure applications from start to finish. Additionally, it underscores the importance and value of the Defense-in-Depth principle across the entire SDLC. Topics covered include security in requirements engineering; secure designs; risk analysis; the SQUARE process model; threat modeling; defensive coding; fuzzing; static analysis and security assessment; memory leaks, buffer and heap overflow attacks, and injection attacks. The course also introduces techniques to adapt common security activities to modern software development practices such as Agile and DevSecOps.

 

CYS636 Networks Security

[3–0, 3 cr.]

This course covers theory and practice of network security. Topics include static packet filter, stateful firewall, proxy firewall, IDS, VPN Device, DMZs and screened subnets, networks defense components, internal network security, host hardening, configuration management, audit, human factors, and security policies. The course also covers cryptographic protocols, privacy, anonymity and various case studies.

 

CYS698 Cybersecurity Project

[3–0, 3 cr.]

This course entails the independent development and documentation of a substantial security-related project using techniques and/or tools learned from the program courses. The course includes periodic reporting of progress, plus a final oral presentation and written report.