Academic Catalog 2025–2026

jump to navigation

Courses

Back to All Disciplines

Cybersecurity Courses

CYS610 Data Science and its Applications

[3–0, 3 cr.]

This course covers essential topics in data science including data collection and preprocessing, exploratory data analysis and data visualization. The course also covers supervised and unsupervised machine learning techniques including regression, classification, clustering and dimensionality reduction, as well as model selection and assessment, and resampling techniques.

CYS611 Design and Analysis of Algorithms

[3–0, 3 cr.]

This course addresses both the fundamentals and the research boundaries of algorithm design and analysis. Covered topics include: complexity of algorithms, divide and conquer techniques, greedy methods, dynamic programming, recursive backtracking, amortized analysis, graph algorithms, polynomial-time problem reduction, NP-completeness, approximation algorithms and a selected advanced topic.

CYS612 AI for Cybersecurity

[2–0, 2 cr.]

This course introduces students to the fundamental concepts and models in Artificial Intelligence that can be applied to cybersecurity data and applications. Topics include analysis of computer viruses, network traffic, financial crime investigations, clustering user activities, and adversarial learning. Students will develop a robust understanding of machine learning’s capabilities and limitations in cybersecurity contexts, including insights into how adversaries use adversarial ML models to target ML-based security systems. The course will equip students with the skills to construct their own AI-based security tools and automate their workflows through the use of AI.

CYS613 Networks Programming

[1–0, 1 cr.]

This course covers methods and tools used for network programming and simulation. Covered topics include operating system support for network protocols, inter-process communication tools (such as pipes, sockets and remote procedure calls), and design of client and server sides of network protocols.

CYS614 Fundamentals of Ransomware

[1–0, 1 cr.]

This  course explores the critical realm of ransomware, providing students with essential knowledge to combat this pervasive cyber threat. Topics include understanding of ransomware fundamentals, attack types, ransomware families, prevention strategies, common signs of ransomware attacks, methods for identifying potential threats, and recovery.

CYS615 Big Data Analytics

[2–0, 2 cr.]

The course covers data management and systems aspects of big data.  Topics include an overview of big data management systems, distributed big-data storage, Programming models in big data, column-based storage, analytics on big data, big spatial data, and document databases.

CYS616 Cryptography and Data Security

[3–0, 3 cr.]

This course is an advanced survey of modern topics of theory, foundations, and applications of modern cryptography. One-way functions, pseudo-randomness, encryption, authentication, public-key cryptosystems, and notions of security, are covered. The course also covers zero-knowledge proofs, multiparty cryptographic protocols, and practical applications.

CYS617 Cybersecurity Data Analytics

[2–0, 2 cr.]

Explores use of big data techniques to cybersecurity problems. Topics include cybersecurity, surveillance, behavioral prediction and manipulation, data sources, data collection techniques and tools, cybersecurity analytics infrastructure, machine learning and data mining, network forensics, anomaly and malware detection, security data visualization, and security dashboard design and implementation.

CYS618 Fundamentals of Computer Networks

[3–0, 3 cr.]

This course covers the fundamental aspects, functions, and techniques of computer networks. Topics include internetworking: Packet-based communications; network routing; TCP/IP networks and addressing; transmission protocols: TCP and UDP; resource management and congestion control; wireless and datacenter networks, software-defined networks, and programmable data-planes; content distribution networks, peer-to-peer networks, video streaming; network security including firewalls and application gateways.

CYS619 Fundamentals of Database Systems

[3–0, 3 cr.]

This course covers several advanced topics in databases and modern data-intensive systems. Topics include advanced concurrency control techniques, query processing and optimization strategies for relational database systems, advanced indexing methods, parallel and distributed database systems, NoSQL, database-as-a-service (DB clouds), data on the web, data replication, and topics in database security and privacy.

CYS621 Information Security

[3–0, 3 cr.]

This course prepares students to develop organizational information security programs and policies that follow recognized standards, comply with all governing laws and regulations, and meet the needs of the company culture and management organization. The course covers how to perform risk management institutionally, how to manage compliance to information security requirements, and how to delegate compliance, risk, and security functions to specific roles within the organization. It also helps learners apply strategic decision-making as companies adapt to new technologies, processes, and people practices related to processing, managing, and protecting information resources.

CYS622 Deep Learning and its Applications

[3–0, 3 cr.]

This course covers principles of deep learning and in its applications. Students will learn how to build and use different kinds of deep neural networks using hands-on approach. Topics include feedforward networks, convolutional neural networks (CNNs), recurrent neural networks (RNNs), transformers and encoders/decoders. The course will include hands-on applications covering natural language processing tasks, behavioral analysis, financial analysis and anomalies detection.

CYS623 Natural Language Processing with Deep Learning

[2–0, 2 cr.]

This course covers word vector representations, embeddings, syntax parsing, vector space modeling, dimensionality reduction, speech tagging, text classification, sentiment analysis, window-based neural networks, recurrent neural networks, long-short-term-memory models, recursive neural networks, convolutional neural networks, and large language models.

CYS624 Reinforcement Learning

[2–0, 2 cr.]

This course covers the fundamentals of reinforcement learning using a problem-based approach by addressing goal-directed problems on automated learning in an uncertain environment. Topics include finite Markov decision processes, dynamic programming, Monte-Carlo simulations, temporal-difference learning including Q-learning, function approximation, and policy gradient methods.

CYS625 Introduction to Generative AI

[2–0, 2 cr.]

This course provides a theoretical foundation and practical skills for Generative AI.  Topics include anatomy of generative models, transformers, GAN, the Diffusion Model for images.  Students will be equipped with the skills to leverage state of the art techniques for visual representation, generative text, text to image synthesis and more.

CYS626 Cybersecurity Law and Policy

[1–0, 1 cr.]

This course will provide students exposure to the key legal and policy issues related to cybersecurity. It includes such topics as data security laws and enforcement actions, cybersecurity litigation, anti-hacking laws, cybersecurity and corporate governance, privacy law, the Fourth Amendment, surveillance, and international cybersecurity law.

CYS627 Cloud Security

[3–0, 3 cr.]

This course teaches students to design security solutions for cloud-based platforms and operations that maintain data availability while protecting the confidentiality and integrity of information. Course topics include cloud service models, deployment methods, identity and access management (IAM) strategies, auditing and monitoring strategies, assessing and mitigating common cloud security threats, and managing compliance and regulation requirements. The course also offers hands-on experience deploying and assessing IAM controls in a cloud environment.

CYS628 Penetration Testing and Vulnerability Analysis

[3–0, 3 cr.]

This course introduces students to a wide range of topics related to ethical hacking and penetration testing. The topics cover the tools and penetration testing methodologies used by ethical hackers. The course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will immerse in a “Hacker Mindset” in order to teach them how to think like a hacker and defend against future cyber-attacks.   Students will utilize hands-on applications of security techniques by employing systematic and ethical hacking processes in a professional manner. Various tools for scanning, penetration testing, and securing target systems will be demonstrated. The five phases of ethical hacking will be presented including reconnaissance, gaining access, enumeration, maintaining access, and covering tracks.

CYS629 Applied Machine Learning

[3–0, 3 cr.]

This course provides an overview of popular algorithms in machine learning. Topics include supervised and unsupervised learning, linear and polynomial regression, clustering, classification algorithms, gradient descent, support vector machines, decision trees, random forests, instance-based learning, neural networks, and genetic algorithms.

CYS630 Blockchain Systems

[3–0, 3 cr.]

This course focuses on the fundamentals of Blockchain Technology. It provides a conceptual insight into the role of Blockchains as a means for securing distributed systems, how consensus on their blocks is reached, and the new applications that they empower. It includes the technological foundations of blockchain functionalities such as distributed data structures and decision-making models, their operations, and various architectures. The course presents a brief discussion on current Smart Contract (SM) techniques and platforms, and studies their future directions, prospects, challenges, and risks. Students will learn how blockchain systems are constructed, how to interact with them, and how to design and implement secure distributed applications. Students apply the knowledge they gain by implementing a detailed blockchain system that includes transactions, blocks, cryptography, and a consensus mechanism using a popular programming language such as Java or Python.

CYS631 Mobile and Wireless Security

[3–0, 3 cr.]

This course will address various issues (attacks and defense strategies) in wireless and mobile security, including WEP and WPA, wireless jamming attacks, and mobile privacy. Topic coverage will include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and cross-layer holistic attacks. Systems of interest include (but are not limited to) personal devices, connected vehicles, embedded and IoT systems, wireless infrastructure, and ad hoc networks.

CYS632 Secure Software Development

[3–0, 3 cr.]

This course focuses on the variety of elements needed to address and implement secure software acquisition and development throughout the software development life cycle (SDLC). The course addresses people, technology, tools, and processes to design and develop consistently secure applications from start to finish. Additionally, it underscores the importance and value of the Defense-in-Depth principle across the entire SDLC. Topics covered include security in requirements engineering; secure designs; risk analysis; the SQUARE process model; threat modeling; defensive coding; fuzzing; static analysis and security assessment; memory leaks, buffer and heap overflow attacks, and injection attacks.  The course also introduces techniques to adapt common security activities to modern software development practices such as Agile and DevSecOps.

CYS635 Internet of Things

[3–0, 3 cr.]

This course exposes students to the fundamentals of IoT as a paradigm in addition to the foundational problems inherent in this realm. The course will introduce the basic terminology and ecosystem, plus development environments. Topics include IoT hardware and software platforms, data collections and analytics for IoT, security and ethical issues inherent in IoT, and networks programming for IoT.  The course explores problem solving for IoT analytics based on machine learning and deep learning using TensorFlow.

CYS636 Networks Security

[3–0, 3 cr.]

This course covers theory and practice of network security. Topics include static packet filter, stateful firewall, proxy firewall, IDS, VPN Device, DMZs and screened subnets, networks defense components, internal network security, host hardening, configuration management, audit, human factors, and security policies. The course also covers cryptographic protocols, privacy, anonymity and various case studies.

CYS638 Computer Forensics

[3–0, 3 cr.]

This course provides a basic knowledge of digital forensic examinations, and shows how evidential findings are applied within criminal and civil cases. Topics include and overview of the tools and techniques used, the types of digital storage media likely to be encountered, and clear explanations of the terminology and software commonly found within cases involving computer evidence. The course also highlights the areas of law most relevant to cases involving digital forensic evidence. It reviews the topics covered in relation to an actual case. This part of the study assesses the documentary evidence paper trail, the forensic examination, findings, and the eventual outcome of the case.

CYS698 Cybersecurity Project

[3–0, 3 cr.]

This course entails the independent development and documentation of a substantial security-related project using techniques and/or tools learned from the program courses. The course includes periodic reporting of progress, plus a final oral presentation and written report.