Any experimental courses offered by INFAS can be found at: registrar.iastate.edu/faculty-staff/courses/explistings/
Courses
Courses primarily for undergraduates:
(Cross-listed with CPR E). (1-0) Cr. 1.
Basic concepts of practical computer and Internet security: passwords, firewalls, antivirus software, malware, social networking, surfing the Internet, phishing, and wireless networks. This class is intended for students with little or no background in information technology or security. Basic knowledge of word processing required.
Offered on a satisfactory-fail basis only.
(Cross-listed with CPR E). (0-2) Cr. 1. Repeatable. S.
Participation in cyber defense competition driven by scenario-based network design. Includes computer system setup, risk assessment and implementation of security systems, as well as defense of computer and network systems against trained attackers. Team based.
Offered on a satisfactory-fail basis only.
(Dual-listed with INFAS 530). (Cross-listed with CPR E). (3-0) Cr. 3.
Prereq: CPR E 381 or equivalent
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.
Courses primarily for graduate students, open to qualified undergraduates:
(Dual-listed with INFAS 430). (Cross-listed with CPR E). (3-0) Cr. 3.
Prereq: CPR E 381 or equivalent
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.
(Cross-listed with CPR E). (3-0) Cr. 3. S.
Prereq: CPR E 531
Computer system and network security: implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures. Study and use of attack tools. Ethics in information assurance. Emphasis on laboratory experiments.
(Cross-listed with CPR E, MATH). (3-0) Cr. 3. S.
Prereq: E E 524 or MATH 317 or MATH 407 or COM S 230
Basic principles of covert communication, steganalysis, and forensic analysis for digital images. Steganographic security and capacity, matrix embedding, blind attacks, image forensic detection and device identification techniques. Related material on coding theory, statistics, image processing, pattern recognition.
(Cross-listed with CPR E). (3-0) Cr. 3.
Prereq: CPR E 489 or CPR E 530
Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments.
(Cross-listed with CPR E). (2-3) Cr. 3. S.
Prereq: COM S 321 or CPR E 381, COM S 352 or CPR E 308
Techniques and tools for understanding the behavior of software/hardware systems based on reverse engineering. Flaw hypothesis, black, grey, and white box testing as well as other methods for testing the security of software systems. Discussion of counter-reverse engineering techniques.
Cr. 1-3. Repeatable.
Prereq: Permission of instructor
Projects or seminar in Information Assurance.
Courses for graduate students:
(Cross-listed with CPR E). (3-0) Cr. 3.
Prereq: INFAS 531, INFAS 532, INFAS 534
Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attack each other's secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report.
(3-0) Cr. 0. Repeatable. F.S.
Prereq: CPR E 530, CPR E 531, permission of instructor.
Discussion of complex cyber security problems. Students will learn how to apply research techniques, think clearly about these issues, formulate and analyze potential solutions, and communicate their results. Working in small groups under the mentorship of technical clients from government and industry, each student will formulate, carry out, and present original research on complex current cybersecurity/information assurance problems of interest to the nation. This course will be run in a synchronized distance fashion, coordinating some activities with our partner schools and our technical clients.
Cr. R.
Prereq: Permission of department, graduate classification
One semester and one summer maximum per academic year professional work period.
Offered on a satisfactory-fail basis only.