Cyber Security (CYBSC)

View PDF

Expand all courses

Courses

Courses primarily for undergraduates:

(Cross-listed with CPRE 1310).
Credits: 1. Contact Hours: Lecture 1.

Basic concepts of practical computer and Internet security: passwords, firewalls, antivirus software, malware, social networking, surfing the Internet, phishing, and wireless networks. This class is intended for students with little or no background in information technology or security. Basic knowledge of word processing required. Offered on a satisfactory-fail basis only.

(Cross-listed with CPRE 3320).
Credits: 1. Contact Hours: Laboratory 2.
Repeatable.

Participation in cyber defense competition driven by scenario-based network design. Includes computer system setup, risk assessment and implementation of security systems, as well as defense of computer and network systems against trained attackers. Team based. Offered on a satisfactory-fail basis only. (Typically Offered: Spring)

Credits: 3. Contact Hours: Lecture 3.

Fundamentals of network security, including common network protocols, potential security risks, and countermeasures. Network routing and its impact on security.

Credits: 2. Contact Hours: Lecture 2.

Mindset and tactics of cyber adversaries. Anticipating and countering cybersecurity threats. Analyzing and predicting the strategies of cyber adversaries, including understanding their motives, methods, and techniques to evade detection. Multi-week team project where students will assume the role of attackers and plan an attack against a fictitious target.

Credits: 2. Contact Hours: Lecture 2.

Introduction and application of basic mechanisms for protecting data. Security issues related to safeguarding sensitive personal and corporate information against inadvertent disclosure. Real-world effects of data breaches on individuals and businesses and the balancing of interests among individuals, government, and enterprises. Emerging technologies that may affect security and privacy concerns. Issues related to developing enterprise data security programs, policies, and procedures that consider the requirements of all relevant constituencies, e.g., technical, business, and legal.

(Dual-listed with CPRE 5300/ CYBSC 5300). (Cross-listed with CPRE 4300).
Credits: 3. Contact Hours: Lecture 3.

Prereq: (CPRE 3080 or COMS 2520 or COMS 3520) OR CPRE 2880
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.

Credits: 0-99. Contact Hours: Lecture 3.
Repeatable.

Digital Forensics.

Credits: 1. Contact Hours: Lecture 1.

Prereq: ENGL 3140 or ENGL 3140H
Training of teaching of basic cybersecurity concepts and running effective security awareness campaigns. Communication strategies, collaboration with departments such as HR, and promoting a security culture within organizations. Preparation to become advocates for security awareness in professional settings.

Credits: 1. Contact Hours: Lecture 1.

Prereq: ENGL 3140 or ENGL 3140H
Introduction to designing and facilitating cybersecurity exercises, including tabletop exercises and livesimulations. Creation of tabletop exercises and live simulations that enhance cybersecurity awareness,preparedness, and response capabilities. Scenario planning, facilitation skills, post-exercise evaluation,adaptation for various roles, and evaluation using federal guidelines.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720 and CYBSC 4300
Tools and methods for threat hunting and intelligence gathering to strengthen organizational defense. Techniques for identifying and mitigating cyber threats, utilizing various security tools and intelligence sources.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720 and CYBSC 4300
Fundamentals of digital forensics and incident response, including evidence collection, analysis, andresponse planning techniques. Preparation to handle security incidents effectively, covering forensicanalysis techniques, evidence collection and handling, response planning, and incident response policydevelopment.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720 and CYBSC 4300
Cryptographic methods for information security, privacy assurance, and authenticity verification.Encryption techniques, cryptographic protocols, secure key management, and digital signatures,emphasizing practical applications in cybersecurity.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Introduction of security principles for operating systems, focusing on securing Windows and Linuxenvironments. Access control, privilege management, file system security, memory management, andsystem hardening techniques to protect against vulnerabilities. Exploring vulnerabilities in operatingsystems, analysis of security features, and defensive strategies for enhancing OS security.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Introduction to cloud security concepts, architectural principles, secure cloud design, and best practicesfor cloud service providers and users. Cloud security principles, including secure design, data protection, identity management, and regulatory compliance. Protecting cloud environments from uniquecybersecurity threats.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Overview of secure software development, common vulnerabilities, secure coding practices, and testingmethods. Basic secure coding practices, threat modeling, vulnerability assessment, and techniques formitigating risks such as buffer overflows, injection attacks, and improper input validation.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Scripting for cybersecurity tasks, focusing on automation and custom tool development. Basics ofscripting languages commonly used in cybersecurity, such as Python and PowerShell. Writing scripts for data parsing, log analysis, and network monitoring, as well as developing custom scripts for security tasks like vulnerability scanning and incident response.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Strategies for designing systems that can withstand and recover from cyber-attacks, detection, response, and recovery from cyber-attacks while minimizing impact. Resilience planning, incident response, maintaining operational continuity, and strategies to ensure operational continuity under adverse conditions.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Cybersecurity challenges unique to cyber-physical systems and critical infrastructure sectors. Securingcyber-physical systems, critical infrastructure, threat modeling, risk management, and incident response. Emphasizes security challenges in energy, manufacturing, agriculture, and transportation sectors.

Credits: 2. Contact Hours: Lecture 2.

Prereq: CYBSC 3710 and CYBSC 3720
Securing web applications by addressing vulnerabilities such as SQL injection and cross-site scripting.Fundamental principles of web security and secure applications. SQL injection, cross-site scripting(XSS), authentication and session management, and the Open Web Application Security Project(OWASP) Top Ten.

Credits: 3. Contact Hours: Lecture 3.

Prereq: CYBSC 3710, CYBSC 3720, CYBSC 4300, and 8 additional credits CYBSC courses
Culminating capstone experience. Development a cybersecurity solution, including threat assessment,architecture design, incident response plan, and final plan presentation.

Courses primarily for graduate students, open to qualified undergraduates:

(Dual-listed with CPRE 4300/ CYBSC 4300). (Cross-listed with CPRE 5300).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.

(Cross-listed with CPRE 5310).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Computer, software, and data security: basic cryptography, security policies, multilevel security models, attack and protection mechanisms, legal and ethical issues.

(Cross-listed with CPRE 5320).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Computer system and network security: implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures. Study and use of attack tools. Ethics in cyber security. Emphasis on laboratory experiments. (Typically Offered: Spring)

(Cross-listed with CPRE 5330/ MATH 5330).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Basic concepts of secure communication, DES and AES, public-key cryptosystems, elliptic curves, hash algorithms, digital signatures, applications. Relevant material on number theory and finite fields. (Typically Offered: Spring)

(Cross-listed with CPRE 5340/ POLS 5340).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Legal and ethical issues in computer security. State and local codes and regulations. Privacy issues. (Typically Offered: Spring)

(Cross-listed with CPRE 5350/ MATH 5350).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Basic principles of covert communication, steganalysis, and forensic analysis for digital images. Steganographic security and capacity, matrix embedding, blind attacks, image forensic detection and device identification techniques. Related material on coding theory, statistics, image processing, pattern recognition. (Typically Offered: Spring)

(Cross-listed with CPRE 5360).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments.

(Cross-listed with CPRE 5380).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Techniques and tools for understanding the behavior of software/hardware systems based on reverse engineering. Flaw hypothesis, black, grey, and white box testing as well as other methods for testing the security of software systems. Discussion of counter-reverse engineering techniques. (Typically Offered: Spring)

(Cross-listed with COMS 5600/ CPRE 5600).
Credits: 3. Contact Hours: Lecture 3.

Prereq: Graduate Standing or Permission of Instructor
Examination of applications of machine learning and big data techniques to various security and privacy problems, as well as secure and privacy-preserving machine learning algorithms. Offered irregularly. (Typically Offered: Spring)

Credits: 1-3. Contact Hours: Lecture 3.
Repeatable.

Prereq: Graduate Standing or Permission of Instructor
Projects or seminar in Cyber Security. (Typically Offered: Fall, Spring, Summer)

Courses for graduate students:

(Cross-listed with CPRE 6310).
Credits: 3. Contact Hours: Lecture 1.
Repeatable.

Practical experience in cyber operations. Cyber security threat analysis, malware analysis, and intrusion detection management. Cyber security data analysis methods. Pen testing tools and techniques. Weekly threat analysis briefings. Offered on a satisfactory-fail basis only.

(Cross-listed with CPRE 6320).
Credits: 3. Contact Hours: Lecture 3.

Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attack each other's secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report.

Credits: 3. Contact Hours: Lecture 3.
Repeatable.

Discussion of complex cyber security problems. Students will learn how to apply research techniques, think clearly about these issues, formulate and analyze potential solutions, and communicate their results. Working in small groups under the mentorship of technical clients from government and industry, each student will formulate, carry out, and present original research on complex current cybersecurity problems of interest to the nation. This course will be run in a synchronized distance fashion, coordinating some activities with our partner schools and our technical clients. (Typically Offered: Fall, Spring)

Credits: Required.

One semester and one summer maximum per academic year professional work period. Offered on a satisfactory-fail basis only.