Learn to outsmart ruthless cyberattackers and protect organizations and individuals from today’s most dangerous threats.
|Course Code||CSEC 6005||Course||The Global Technology Environment||Credits||(3 sem. cr.)|
|Course Code||CSEC 6215||Course||Security Risk Management||Credits||(3 sem. cr.)|
|Course Code||CSEC 6210||Course||Cloud Computing||Credits||(3 sem. cr.)|
|Course Code||CSEC 6175||Course||Software Testing and Quality Assurance||Credits||(3 sem. cr.)|
|Course Code||CSEC 6190||Course||Foundations of Intelligent Systems||Credits||(3 sem. cr.)|
|Course Code||CSEC 6670||Course||Security Engineering and Compliance||Credits||(3 sem. cr.)|
|Course Code||CSEC 6735||Course||Applied Cryptography||Credits||(3 sem. cr.)|
|Course Code||CSEC 6270||Course||Cyber Forensics||Credits||(3 sem. cr.)|
|Course Code||CSEC 6255||Course||Cybercrime Prevention and Protection||Credits||(3 sem. cr.)|
|Course Code||CSEC 6635||Course||Secure Coding||Credits||(3 sem. cr.)|
Students in this course are provided a critical "state-of-the-art" breadth-first review of the domain of information technology (IT). Designed to provide students with a wide-ranging introduction to topics such as software engineering, cybersecurity, and big data analytics, students completing the course have a comprehensive global view of the current IT landscape in the context of both commercial and noncommercial enterprises. The class blends both theory and practice to provide a solid foundation for future study. Students study the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society.
Threats to information security (IS) are becoming more sophisticated. Laws and regulations impose strict (cyber) security risk management requirements on all enterprises to prevent, or at least limit, the potential of cyberattacks. Course content is directed at providing a deep understanding of the mechanisms and techniques that can be used to identify and mitigate against security risk. Students in this course are provided with the theoretical and practical knowledge to deliver a formal, systematic, and in-depth approach to the application of the concepts, techniques, methods, approaches, and processes of (cyber) security risk management in a pragmatic manner and in the context of enterprises of all kinds.
Cloud computing has attained great commercial significance in recent years. As companies seek to drive down the capital (and recurrent) costs of doing business, using cloud computing to reduce expenditure by outsourcing aspects of the organizations' IT infrastructure to external, web-accessible systems has become a critical goal. In this course, students study the key concepts, theories, techniques, and practices that underpin cloud computing, including the main abstraction, component and deployment models that characterize cloud computing. Students have the opportunity to critically appreciate issues and problems, as well as cutting-edge solutions, pertaining to cloud computing.
Students in this course are provided a general overview of software engineering in the context of testing and quality assurance, both of which are important facets of modern software engineering that have technical, financial, and ethical implications for organizations. Students explore focused topics, such as testing methods; developing tests at the unit, integration, and systems level; techniques for stress testing; complexity and test metrics; quality management standards; and configuration management. Students have the opportunity to develop a critical awareness and comprehensive understanding of software testing and quality assurance, and the capability to create successful testing and quality assurance processes to support the needs of modern software engineering projects.
Students in this course are introduced to the concepts of artificial intelligence and emergent areas of intelligent systems. Students have the opportunity to gain a critical understanding of knowledge representation, reasoning, machine learning, and evolutionary techniques. Students are presented with real-world problems and have the opportunity to apply "intelligent" techniques to provide solutions to these problems.
Students in this course are provided with insight into information security principles, security policy models/protocols, industry standards for security compliance, and risk assessment. Students have the opportunity to acquire a critical understanding of how to use information security techniques to solve practical security problems. The course also allows students to acquire skills for designing/implementing security infrastructure and writing security/incident response polices. The course features practical, extensive, hands-on project work so that students are ready to apply their gained knowledge in the workplace.
In this course students are provided with insight into cryptographic algorithms and protocols. Students have the opportunity to acquire a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (confidentiality, integrity, authenticity, and so on). Students also have the opportunity to acquire a systematic understanding concerning open source tools to build secure applications and knowledge of how best to apply such tools.
In this course students are provided with knowledge and systematic understanding of the practice of extracting evidence from computers and digital storage media. Students are provided with the knowledge whereby they can identify, extract, document, interpret, and preserve computer media as digital evidence, as well as how to analyze the root cause of security breaches. Course content covers issues such as crypto-literacy, data hiding, and hostile code.
Combatting cybercrime requires a deep understanding of the mechanisms and techniques that can be used to prevent or at least mitigate against it. In this course students consider the motivations for cybercrime and have the opportunity to develop a comprehensive understanding of the tools that can be used to prevent it, including the deployment of cybercrime prevention strategies. Students build an "ethical hacking" environment with which they can experiment. In addition, the course is directed at providing students with hands-on knowledge of cybercrime prevention for application in the workplace.
In this course students are provided with an understanding of secure software development practices. Students have the opportunity to gain an understanding of how to integrate security into the application/software development process. Students also have the opportunity to study some of the techniques for writing secure code, language-based security models, and isolation techniques to protect data.