Links to Courseware
•Course 0: Introduction to Cyber Security Engineering (1) a short introduction to this series of courses and concepts.
•Course 0: Introduction to Cyber Security Engineering (1) a short introduction to this series of courses and concepts.
•Course 1: FOUNDATIONS OF INFORMATION SECURITY (3) a broad overview of the concepts, fundamental ideas, vocabulary and literature base central to the study and development of secure information systems.
•Course 1: FOUNDATIONS OF INFORMATION SECURITY (3) a broad overview of the concepts, fundamental ideas, vocabulary and literature base central to the study and development of secure information systems.
•Course 2: Cryptography - APPLICATION OF MODERN CRYPTOGRAPHY AND CRYPTANALYSIS TO CURRENT INFORMATION SECURITY PROBLEMS (3) The power of cryptography and the problems and pitfalls associated with its use.
•Course 2: Cryptography - APPLICATION OF MODERN CRYPTOGRAPHY AND CRYPTANALYSIS TO CURRENT INFORMATION SECURITY PROBLEMS (3) The power of cryptography and the problems and pitfalls associated with its use.
•Course 5: NETWORK SECURITY (3) The fundamentals of information security in the context of distributed systems and networks.
•Course 5: NETWORK SECURITY (3) The fundamentals of information security in the context of distributed systems and networks.
•Course 6: TRUSTED SYSTEMS DESIGN, ANALYSIS AND DEVELOPMENT (3) This course conveys a methodology for the development of trusted systems in which the adversary is considered "part of the system".
•Course 6: TRUSTED SYSTEMS DESIGN, ANALYSIS AND DEVELOPMENT (3) This course conveys a methodology for the development of trusted systems in which the adversary is considered "part of the system".
•Course 7: SECURE SYSTEMS ADMINISTRATION (3) The system security administrator plays an integral role in the system security testing, certification, accreditation, and operation of complex cyber systems, as well as operationally defending the system against real-time attacks.
•Course 7: SECURE SYSTEMS ADMINISTRATION (3) The system security administrator plays an integral role in the system security testing, certification, accreditation, and operation of complex cyber systems, as well as operationally defending the system against real-time attacks.
•Course 8: SECURE SYSTEMS ENGINEERING (3) This capstone course is to equip the student with a global view of the process of designing and developing and fielding secure information systems.
•Course 8: SECURE SYSTEMS ENGINEERING (3) This capstone course is to equip the student with a global view of the process of designing and developing and fielding secure information systems.
•Course 9: COMPUTER AND NETWORK FORENSICS (3) This course takes a technical, legal and practical approach to the preservation, identification, extraction and documentation of computer evidence stored on a computer.
•Course 9: COMPUTER AND NETWORK FORENSICS (3) This course takes a technical, legal and practical approach to the preservation, identification, extraction and documentation of computer evidence stored on a computer.