Cyber Security (CYBSC)

This is an archived copy of the 2022-2023 catalog. To access the most recent version of the catalog, please visit http://catalog.iastate.edu.

View PDF

Expand all courses

Courses

Courses primarily for undergraduates:

(Cross-listed with CPR E). (1-0) Cr. 1.


Basic concepts of practical computer and Internet security: passwords, firewalls, antivirus software, malware, social networking, surfing the Internet, phishing, and wireless networks. This class is intended for students with little or no background in information technology or security. Basic knowledge of word processing required. Offered on a satisfactory-fail basis only.

(Cross-listed with CPR E). (0-2) Cr. 1. Repeatable. S.


Participation in cyber defense competition driven by scenario-based network design. Includes computer system setup, risk assessment and implementation of security systems, as well as defense of computer and network systems against trained attackers. Team based. Offered on a satisfactory-fail basis only.

(Dual-listed with CYBSC 530). (Cross-listed with CPR E). (3-0) Cr. 3.

Prereq: CPR E 308 OR COM S 252 OR COM S 352
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.

Courses primarily for graduate students, open to qualified undergraduates:

(Dual-listed with CYBSC 430). (Cross-listed with CPR E). (3-0) Cr. 3.

Prereq: CPR E 308 OR COM S 252 OR COM S 352
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols. Network security issues, attack and mitigation techniques. Emphasis on laboratory experiments.

(Cross-listed with CPR E). (3-0) Cr. 3.

Prereq: CPR E 489 or CPR E 530 or COM S 586 or MIS 535
Computer, software, and data security: basic cryptography, security policies, multilevel security models, attack and protection mechanisms, legal and ethical issues.

(Cross-listed with CPR E). (3-0) Cr. 3. S.

Prereq: CPR E 430 or 530
Computer system and network security: implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures. Study and use of attack tools. Ethics in cyber security. Emphasis on laboratory experiments.

(Cross-listed with CPR E, MATH). (3-0) Cr. 3. S.

Prereq: MATH 301 or CPR E 310 or COM S 230
Basic concepts of secure communication, DES and AES, public-key cryptosystems, elliptic curves, hash algorithms, digital signatures, applications. Relevant material on number theory and finite fields.

(Cross-listed with CPR E, POL S). (3-0) Cr. 3. S.

Prereq: Graduate classification; CPR E 531 or CYBSC 531
Legal and ethical issues in computer security. State and local codes and regulations. Privacy issues.

(Cross-listed with CPR E, MATH). (3-0) Cr. 3. S.

Prereq: E E 524 or MATH 317 or MATH 407 or COM S 230
Basic principles of covert communication, steganalysis, and forensic analysis for digital images. Steganographic security and capacity, matrix embedding, blind attacks, image forensic detection and device identification techniques. Related material on coding theory, statistics, image processing, pattern recognition.

(Cross-listed with CPR E). (3-0) Cr. 3.

Prereq: CPR E 489 or CPR E 530
Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments.

(Cross-listed with CPR E). (2-3) Cr. 3. S.

Prereq: COM S 321 or CPR E 381, COM S 352 or CPR E 308
Techniques and tools for understanding the behavior of software/hardware systems based on reverse engineering. Flaw hypothesis, black, grey, and white box testing as well as other methods for testing the security of software systems. Discussion of counter-reverse engineering techniques.

(Cross-listed with COM S, CPR E). Cr. 3. Alt. S., offered irregularly.

Prereq: CPR E 531; COM S 474 or COM S 573
Examination of applications of machine learning and big data techniques to various security and privacy problems, as well as secure and privacy-preserving machine learning algorithms.

Cr. 1-3. Repeatable.

Prereq: Permission of instructor
Projects or seminar in Cyber Security.

Courses for graduate students:

(Cross-listed with CPR E). Cr. 3. Repeatable.

Prereq: CPR E 532; CPR E 534; and permission of instructor
Practical experience in cyber operations. Cyber security threat analysis, malware analysis, and intrusion detection management. Cyber security data analysis methods. Pen testing tools and techniques. Weekly threat analysis briefings. Offered on a satisfactory-fail basis only.

(Cross-listed with CPR E). (3-0) Cr. 3.

Prereq: CYBSC 531, CYBSC 532, CYBSC 534
Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attack each other's secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report.

(3-0) Cr. 3. Repeatable. F.S.

Prereq: CPR E 530, CPR E 531, permission of instructor.
Discussion of complex cyber security problems. Students will learn how to apply research techniques, think clearly about these issues, formulate and analyze potential solutions, and communicate their results. Working in small groups under the mentorship of technical clients from government and industry, each student will formulate, carry out, and present original research on complex current cybersecurity problems of interest to the nation. This course will be run in a synchronized distance fashion, coordinating some activities with our partner schools and our technical clients.

Cr. R.

Prereq: Permission of department, graduate classification
One semester and one summer maximum per academic year professional work period. Offered on a satisfactory-fail basis only.