Skip redundant pieces

ITTC

Education

Core EECS Cybersecurity Courses

EECS 465 Cyber Defense

An introduction to critical knowledge and skills needed to administer and defend computer networks and systems. This course focuses on hands-on activities, learning cybersecurity defensive techniques, and understanding well know techniques used by adversaries.

EECS 563 Introduction to Communication Networks

An introduction to the principles used in communication networks is given in this course. Topics include a discussion of the uses of communications networks, network traffic, network impairments, standards, layered reference models for organizing network functions. Local Area Network technology and protocols are discussed. Link, network, transport layer protocols, and security are introduced. TCP/IP networks are stressed. VoIP is used as an example throughout the course. Basic concepts of network performance evaluation are studied, both analytical and simulation techniques are considered.

EECS 565 Introduction to Information and Computer Security

An introduction to the fundamentals of cryptography and information and computer security. Introduces the basic concepts, theories, and protocols in computer security. Discusses how to apply such knowledge to analyze, design and manage secure systems in the real world. Topic covered: the basics of cryptography, software security, operating system security, database security, network security, privacy and anonymity, social engineering, digital forensics, etc.

EECS 569 Computer Forensics

This course covers both the theoretical and practical aspects of computer forensics. The course introduces the basic concepts, methodologies, and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices. Topics include: crime investigation and digital evidence, file system forensics, application analysis, network evidence acquisition and analysis, mobile device forensics, etc.

EECS 700 Special Topics: Mobile Security

This course covers topics related to mobile security such as Android security model, mandatory access control, ransomware App policies, App permissions, user tracking, tapjacking, embedded threats, malvertising, mobile side-channels, mobile privacy, physical-layer attacks, dynamic analysis, human factors, static analysis, etc.

EECS 700 Special Topics: IoT Security

This course will cover the concept of IoT including its components and architectures, and introduce the advanced topics of IoT security and privacy challenges. The goal is to expose students to new developments in cybersecurity for IoT as well as familiarize them with tools and techniques for IoT security design and analysis. Students will gain hands-on experiences on implementing security techniques for IoT though course projects.

EECS 711 Security Management and Audit

Administration and management of security of information systems and networks, intrusion detection systems, vulnerability analysis, anomaly detection, computer forensics, auditing and data management, risk management, contingency planning and incident handling, security planning, e-business and commerce security, privacy, traceability and cyber-evidence, human factors and usability issues, policy, legal issues in computer security.

EECS 755 Software Modeling and Analysis

Modern techniques for modeling and analyzing software systems. Course coverage concentrates on pragmatic, formal modeling techniques that support predictive analysis. Topics include formal modeling, static analysis, and formal analysis using model checking and theorem proving systems.

EECS 765 Introduction to Cryptography and Computer Security

Comprehensive coverage to the fundamentals of cryptography and computer and communication security. This course serves as the first graduate level security course, which introduces the core concepts, theories, algorithms and protocols in computer and communication security, and also prepares students for advanced security courses. This course first covers the mathematical foundation of cryptography and its applications in computer security. The course also covers a wide range of topics: information and database security, software and computer systems security, network security, Internet and web security.

EECS 819 Cryptography

Introduction to the mathematical background, basic concepts, components, and protocols to enforce secrecy, integrity, and privacy through cryptographic mechanisms. The concept of symmetric and asymmetric encryption, integrity verification, authentication, key establishment and update, and authorization. Emphasis on the design of protocols that apply and integrate various modules to achieve safety objectives: timestamping, digital signature, bit commitment, fair coin-flip, zero knowledge proof, oblivious transfer, and digital cash. The policies for key generation and management, information storage and access control, legal issues, and design of protocols for real applications.

EECS 866 Network Security

This course provides in-depth coverage on the concepts, principles, and mechanisms in network security and secure distributed systems. The topics that will be covered include: network security primitives, risks and vulnerabilities, authentication, key management, network attacks and defense, secure communication protocols, intrusion detection, exploit defenses, traffic monitoring and analysis, and privacy mechanisms.

MSIT Cybersecurity Courses

IT 710 Information Security and Assurance

This introductory security course covers a wide range of topics in the area of information and network security, privacy, and risk: the basic concepts: confidentiality, integrity and availability; introduction to cryptography; authentication; security models; information and database security; computer systems security; network security; Internet and web security; risk analysis; social engineering; computer forensics.

IT 712 Network Security and its Application

This course focuses on network-based information and communication systems, and examines network technologies and service applications to provide the students with a comprehensive introduction to the field of network security and its application. The course covers key concepts and critical network security services including authentication and access control, integrity and confidentiality of data, routing, firewalls, virtual private networks, web security, virus protection, and network security architecture and policy development. The students are expected to understand the technical vulnerabilities of networked systems and to develop methods to eliminate or mitigate those vulnerabilities.

IT 714 Information Security and Cyber Laws

The objectives of this course is to present an introduction to the legal and ethical issues and challenges in the information age, to provide a survey of legal and ethical issues introduced by information security, and to discuss individual rights vs. national interests. A coverage of key cyber laws that impact information security and IT professionals and topics related to intellectual property, copyrights, digital forensics, e-surveillance, and e-discovery for legal evidence and lawsuits will be provided. A review of preventative legal management practices in the context of information security (including employee awareness training) will be presented.