EECS 465 Cyber Defense
An introduction to critical knowledge and skills needed to administer and defend computer networks and systems. This course focuses on hands-on activities, learning cybersecurity defensive techniques, and understanding well know techniques used by adversaries.
EECS 563 Introduction to Communication Networks
An introduction to the principles used in communication networks is given in this course. Topics include a discussion of the uses of communications networks, network traffic, network impairments, standards, layered reference models for organizing network functions. Local Area Network technology and protocols are discussed. Link, network, transport layer protocols, and security are introduced. TCP/IP networks are stressed. VoIP is used as an example throughout the course. Basic concepts of network performance evaluation are studied, both analytical and simulation techniques are considered.
EECS 565 Introduction to Information and Computer Security
An introduction to the fundamentals of cryptography and information and computer security. Introduces the basic concepts, theories, and protocols in computer security. Discusses how to apply such knowledge to analyze, design and manage secure systems in the real world. Topic covered: the basics of cryptography, software security, operating system security, database security, network security, privacy and anonymity, social engineering, digital forensics, etc.
EECS 569 Computer Forensics
This course covers both the theoretical and practical aspects of computer forensics. The course introduces the basic concepts, methodologies, and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices. Topics include: crime investigation and digital evidence, file system forensics, application analysis, network evidence acquisition and analysis, mobile device forensics, etc.
EECS 700 Special Topics: Mobile Security
This course covers topics related to mobile security such as Android security model, mandatory access control, ransomware App policies, App permissions, user tracking, tapjacking, embedded threats, malvertising, mobile side-channels, mobile privacy, physical-layer attacks, dynamic analysis, human factors, static analysis, etc.
EECS 700 Special Topics: IoT Security
This course will cover the concept of IoT including its components and architectures, and introduce the advanced topics of IoT security and privacy challenges. The goal is to expose students to new developments in cybersecurity for IoT as well as familiarize them with tools and techniques for IoT security design and analysis. Students will gain hands-on experiences on implementing security techniques for IoT though course projects.
EECS 711 Security Management and Audit
Administration and management of security of information systems and networks, intrusion detection systems, vulnerability analysis, anomaly detection, computer forensics, auditing and data management, risk management, contingency planning and incident handling, security planning, e-business and commerce security, privacy, traceability and cyber-evidence, human factors and usability issues, policy, legal issues in computer security.
EECS 755 Software Modeling and Analysis
Modern techniques for modeling and analyzing software systems. Course coverage concentrates on pragmatic, formal modeling techniques that support predictive analysis. Topics include formal modeling, static analysis, and formal analysis using model checking and theorem proving systems.
EECS 765 Introduction to Cryptography and Computer Security
Comprehensive coverage to the fundamentals of cryptography and computer and communication security. This course serves as the first graduate level security course, which introduces the core concepts, theories, algorithms and protocols in computer and communication security, and also prepares students for advanced security courses. This course first covers the mathematical foundation of cryptography and its applications in computer security. The course also covers a wide range of topics: information and database security, software and computer systems security, network security, Internet and web security.
EECS 819 Cryptography
Introduction to the mathematical background, basic concepts, components, and protocols to enforce secrecy, integrity, and privacy through cryptographic mechanisms. The concept of symmetric and asymmetric encryption, integrity verification, authentication, key establishment and update, and authorization. Emphasis on the design of protocols that apply and integrate various modules to achieve safety objectives: timestamping, digital signature, bit commitment, fair coin-flip, zero knowledge proof, oblivious transfer, and digital cash. The policies for key generation and management, information storage and access control, legal issues, and design of protocols for real applications.
EECS 866 Network Security
This course provides in-depth coverage on the concepts, principles, and mechanisms in network security and secure distributed systems. The topics that will be covered include: network security primitives, risks and vulnerabilities, authentication, key management, network attacks and defense, secure communication protocols, intrusion detection, exploit defenses, traffic monitoring and analysis, and privacy mechanisms.