|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Credits: 3 Provides hands-on experience in configuring and experimenting with commodity-networked systems and security software in a live laboratory environment, with the purpose of understanding real-world security threats. Takes both offensive and defensive approaches and exposes students to a variety of real-world attacks, including viruses, worms, rootkits, and botnets. Possible mitigation and defending mechanisms, such as firewalls and intrusion detection software, also covered. Prerequisites ISA 562 and ISA 563 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Describes language-based techniques to provide security for executing code. Topics include a discussion on the need for and the advantages of language-based security, security principles and properties, memory and type safety, encapsulation and access control, certifying compilers and their verification methods, security types and information flow, and applying programming language-inspired techniques to enforce security in the semantic-web based languages. Prerequisites CS 540 and ISA 562 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Focuses on security policy and its management for information systems having national and international connectivity. Issues include legal, international, cultural, and local factors. Students are expected to participate regularly in presenting material, in discussion of recent security issues, and by writing short papers on major current issues. Prerequisites ISA 562 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Presents the fundamental concepts of the IT-security audit and control process that is being conducted in a plethora of environments, including government, the financial industry, and the healthcare industry. The goal of this course is to enable the students to structure and perform audits based on the specifications of Sarbanes-Oxley, HIPAA, and FISMA audit programs. Covers all the CISA certification requirements in depth. Students completing the course are encouraged to attempt the certification exam on their own. Prerequisites ISA 562 or ISA 522 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 An in-depth introduction to the theory and practice of network security. It assumes basic knowledge of cryptography and its applications in modern network protocols. Studies firewalls architectures and virtual private networks and provides deep coverage of widely used network security protocols such as SSL, TLS, SSH, Kerberos, IPSec, IKE, and LDAP. It covers countermeasures to distributed denial of service attacks, security of routing protocols and the Domain Name System, e-mail security and spam countermeasures, wireless security, multicast security, and trust negotiation. Prerequisites ISA 562 and CS 555 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Covers fundamentals and advanced topics in operating system (OS) security, including OS-level security mechanisms and policies in investigating and defending against real-world attacks on computer systems, such as self-propagating worms and large-scale botnets. Basic OS security techniques, such as logging, system call auditing, and memory protection, will be discussed. Recent advanced techniques, such as honeypots and honeyfarms, system randomization, vulnerability fingerprinting, and virtualization, will also be introduced. Prerequisites CS 571 and ISA 562 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Studies methodologies, techniques, and tools for monitoring events in computer system or network, with the objective of preventing and detecting unwanted process activity and recovering from malicious behavior. Topics include types of threats, host-based and network-based information sources, vulnerability analysis, denial of service, deploying and managing intrusion detection systems, passive versus active responses, and designing recovery solutions. Prerequisites ISA 562 and 650 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Cross-Listed with SWE 781 Theory and practice of software security, focusing in particular on some common software security risks, including buffer overflows, race conditions and random number generation, and the identification of potential threats and vulnerabilities early in the design cycle. Emphasis is on methodologies and tools for identifying and eliminating security vulnerabilities, techniques to prove the absence of vulnerabilities, and ways to avoid security holes in new software and on essential guidelines for building secure software. Explores how to design software with security in mind from the ground up and integrate analysis and risk management throughout the software life cycle. Prerequisites SWE 619 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Special topics in information security and assurance not occurring in regular ISA sequence. Prerequisites Permission of instructor. Notes May be repeated for credit when distinct offerings of course differ in subject. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
-
3.00 Credits
Credits: 3 Teaches how to design, understand, verify, and test communication protocols so they meet their objectives of recognizing the basic components of a communication protocol; specifying security properties accurately; modeling actors and mal-actors against which a protocol ought to be secure; discussing verification and testing methods and their limitations by ensuring that the specified protocol satisfies stated security objectives in the presence of specified mal-actions; designing a medium-size protocol that satisfies a specification of requirement; using existing tools to specify and verify security protocols; and testing protocols for satisfying their security objectives. Prerequisites ISA 650 or permission of instructor. Hours of Lecture or Seminar per week 3 Hours of Lab or Studio per week 0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|