CYBR 500 Beyond Code: Cybersecurity in Context 3 Credits
At its core, cybersecurity is a technical, computing-based discipline. This course explores the most important non-technical elements that shape the landscape upon which cybersecurity problems emerge and are managed. Students will assume different lenses — legal, economic, political, societal, and ethical — to better understand how different forces enable and constrain security technologies and policies. Specific topics include ethical and societal issues, policy-making, business models, legal frameworks, national security considerations, and the roles of users, industry, and government which includes the military.
CYBR 510 Cryptography for Cybersecurity 3 Credits
This course focuses on both mathematical foundations and practical applications of cryptography. The course discusses asymmetric and symmetric cryptography, Kerchkoff’s Principle, chosen and known plaintext attacks, public key infrastructure, authentication protocols. The course includes a close examination of various cryptosystems including the RSA, DES, AES, Elliptic Curve, and SHA family cryptosystems. Topics include a brief history of cryptography, ciphers, digital signatures, hash functions, message authentication codes, secure e-commerce, and digital cash.
Prerequisite(s): An undergraduate course in discrete structures (CSC 140) or discrete mathematics.
CYBR 520 Managing Cyber Risks 3 Credits
In the context of risk management, this course examines the motivating reasons behind
cyber attacks and data breaches. Various risk management frameworks to measure
organizational cybersecurity threats and vulnerabilities are presented. Further, students
will model cybersecurity risks, using both qualitative and quantitative risk assessment
methods. Students also will articulate the organizational consequences of the assessed
risks along with mitigating strategies to reduce or eliminate the cyber risks.
CYBR 530 Mobile Computing and Wireless Security 3 Credits
This course examines the cybersecurity of mobile computing and wireless networking, especially the vulnerabilities, threats, and mitigation techniques. Topics include: mobile malware, wireless communications infrastructure vulnerabilities and associated mitigation techniques, mobile platform vulnerabilities and associated mitigation techniques, mobile app vulnerabilities and associated mitigation techniques, mobile device vulnerabilities and associated mitigation techniques, and organizational policies for mobile computing and wireless networking.
Prerequisite(s): CYBR 510.
CYBR 540 Secure Coding for Cyber Defense 3 Credits
This combined course of lecture and hands-on labs follows the philosophy and principles
of secure and robust programming, using the Java language. The eight design principles
that govern secure and robust coding will be emphasized with follow-on coding labs to
apply these design methods to real-world problems. Design choices, good or bad, drive
implementation in coding, so designing software security from the beginning will be
practiced. Common software vulnerabilities and static analysis of code will be examined,
as well as informal, formal, and ad hoc coding methods will be differentiated. Prior
experience with the Java programming language is highly recommended.
CYBR 550 Cybercrime and Digital Forensics Analysis 3 Credits
Digital forensics is a hybrid science that offers a systematic approach for conducting
comprehensive investigations to solve cybercrimes. In this course, students will learn the
principles and techniques of digital forensics investigations to ensure court admissibility
of electronic evidence, including the legal and ethical implications. Students also will
also gain hands-on experience with performing proper forensic investigations with
different file systems (e.g., Unix/Linux, Mac, Windows, Android) and writing
appropriate forensics analysis reports.
CYBR 560 Usable Privacy and Security 3 Credits
There is growing recognition that technology alone cannot provide all of the solutions to security and privacy problems. Human factors play an important role, and it is important for security and privacy experts to have an understanding of how people might interact with the systems they develop. This course explores a variety of usability and user interface pitfalls related to privacy and security and provides experiences in designing studies aimed at helping to evaluate usability issues in security and privacy systems.
Prerequisite(s): CYBR 500.
CYBR 570 Special Topics in Cybersecurity 3 Credits
This course is used as a general placeholder for one time offerings and new courses that have not been assigned a permanent designation. The course will cover advanced and emerging topics of current interest in cybersecurity. This course code may be taken more than once as long as the topic offered is different each time.
Prerequisite(s): Permission of instructor.
CYBR 600 Software Vulnerability and Malware Analysis 3 Credits
This combined course of lecture and hands-on labs covers both the art and science of discovering software vulnerabilities and malware. Beginning with the foundational techniques used to analyze both source and binary code, this course will examine current threats and evaluate the actions needed to prevent attackers from taking advantage of both known and unknown vulnerabilities. The course will cover passive and active reverse engineering techniques in order to discover and categorize software vulnerabilities and malware, create workarounds to better secure the system, and demonstrate security solutions that provide protection from an adversary attempting to exploit the vulnerabilities. Techniques covered include the use of static analysis, dynamic reverse engineering tools, and fault injection to better understand and improve the security of software. Prior exposure to Intel assembly is helpful, though not required.
Prerequisite(s): CYBR 540.
CYBR 610 Cloud Computing Security and Privacy 3 Credits
This course focuses on the security and privacy issues in Cloud Computing. While the Cloud Computing paradigm gains in popularity, there are many unresolved cybersecurity issues related to confidentiality, integrity, and availability of data and computations involving the Cloud. This course examines Cloud Computing models and the associated risks, threats and vulnerabilities; focuses on sound architectural design for secure and private computing; and explores practical applications of cloud computing and the Internet of Things (IoT).
Prerequisite(s): CYBR 530.
CYBR 620 Blockchains and Cryptocurrencies 3 Credits
This combined Lecture-Lab course covers the mathematical, computational, and economic foundations of Blockchain technology, and exposes students to the societal and legal implications of a decentralized monetary system based on consensus. Students learn what cryptocurrencies are, why it is possible to make money using cryptocurrencies such as bitcoins, and why it is so volatile. Through hands-on practice with the bitcoin and Ethereum-based software platforms, students will program secure decentralized applications (Dapps), develop an understanding of cryptographic principles, and reexamine critical economic questions.
Prerequisite(s): CYBR 510.