Links to Courseware

Course 0: Introduction to Cyber Security Engineering (1) a short introduction to this series of courses and concepts.

Course 1: FOUNDATIONS OF INFORMATION SECURITY (3) a broad overview of the concepts, fundamental ideas, vocabulary and literature base central to the study and development of secure information systems.

Course 2: Cryptography - APPLICATION OF MODERN CRYPTOGRAPHY AND CRYPTANALYSIS TO CURRENT INFORMATION SECURITY PROBLEMS (3) The power of cryptography and the problems and pitfalls associated with its use.

Course 3: POLICY: THE FOUNDATION OF A SUCCESSFUL INFORMATION ASSURANCE PROGRAM (3) The policy must carefully lay out the business case for the information protection.

Course 4: ASSURANCE IN CYBER SPACE AND APPLIED TO INFORMATION SECURITY (3) “the basis for believing an information system will behave as expected and do nothing more”

Course 5: NETWORK SECURITY (3) The fundamentals of information security in the context of distributed systems and networks.

Course 6: TRUSTED SYSTEMS DESIGN, ANALYSIS AND DEVELOPMENT (3) This course conveys a methodology for the development of trusted systems in which the adversary is considered "part of the system".

Course 7: SECURE SYSTEMS ADMINISTRATION (3) The system security administrator plays an integral role in the system security testing, certification, accreditation, and operation of complex cyber systems, as well as operationally defending the system against real-time attacks.

Course 8: SECURE SYSTEMS ENGINEERING (3) This capstone course is to equip the student with a global view of the process of designing and developing and fielding secure information systems.

Course 9: COMPUTER AND NETWORK FORENSICS (3) This course takes a technical, legal and practical approach to the preservation, identification, extraction and documentation of computer evidence stored on a computer.