Department Requirements - Cybersecurity
1) CCCY 210 Computing Ethics
The objective of this course is to explore the ethical and social issues sparked by the ever-growing information society at the local and global level. This course tries to introduce a balanced coverage of ethical problems and issues encountered by computer professionals in today’s environment.
2) CCCY 320 Cybersecurity Fundamentals
The Cybersecurity Fundamentals Course will provide students with principles of data and technology that frame and define cybersecurity. Students will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. This course helps students to understand the players in the cyber security world and motivation of cyber criminals and cybersecurity professionals. Learn to identify security attacks, symptoms, processes, and countermeasures. Learn foundational and essential knowledge in various security domains – cybersecurity, information security, application security, host and system security, network security, security laws, ethics, and security policies. Build skills in security management, controls, and protection and mitigation technologies.
3) CCCY 412 System Administration
This course will enable students to gain practical knowledge of Linux based system administration. Topics include: shell commands, basic scripting, file system and its structure, storage medium, access control, user’s management and backups. Students will also gain working knowledge of networking terms and concepts pertaining to system administration, including DNS, DHCP and Routing. Techniques for system administration will be developed through laboratory activities in combination with lectures and design tasks.
4) CCCY 410 Cryptography
The objective of this course is to equip students with the scientific and mathematical concepts and operational issues related to modern cryptography and their related standards. Topics include security threats and vulnerabilities, classical encryption techniques, block ciphers and stream ciphers, DES and triple DES, AES, Block cipher operation modes, asymmetric ciphers: RSA, Diffie-Hellman key exchange, hash functions, MAC functions, digital signature: digital Signature Standard DSS, user authentication, key management and distribution, X.509 certificates, web security: SSL and TLS, email security (PGP).
5) CCCY 422 Information Security Management
This course introduces the fundamental of information security management. It describes the information security planning, implementation and maintenance. It highlights the old and state of the art security technologies used for information security management. It discusses the risk management process and how to measure risk. The course introduces the legal, ethical and professional aspect of information security management.
6) CCCY 420 Network Security
This course provides an overview of network security and related topics. Various network-based threats and defense techniques will be discussed. Several network security protocols will be covered including SSL and IPSec. Additionally, the course provides in-depth coverage of network security protocols and related topics including cloud security and wireless security. The course will go over email security as well as DNS security.
7) CCCY 423 Software Security
Software security is to allow any intended use of software but prevent any unintended use. Such unintended uses may cause harm. This course focuses on basic software security principles, secure software development from design over implementation to testing, software security policies (with a focus on memory and type unsafe language like C/C++), defense strategies and risk management with a focus on verification, testing, and mitigation, attack vectors, and several case studies.
8) CCCY 421 Security Architecture and Engineering
This course focuses on hardware, software, and operating system security. It covers also security models and evaluation methods. The covered security models include Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. Regarding the evaluation models, the course covers Common Criteria, Trusted Computer Security Evaluation Criteria (TCSEC), Trusted Network Implementation (TNI), Information Technology Security Evaluation Criteria (ITSEC), Software Engineering Institute Capability Maturity Model Integration (SEI-CMMI), and Systems Security Engineering Capability Maturity Model (SSE-CMM).
9) CCCY 511 Vulnerability Analysis and Testing
This course provides the set of techniques for the penetration testing that are using to penetrate in a network as an ethical hacker. The starts with the ways the vulnerability analysis can be performed. It starts with finding live hosts and open ports to break into by exploiting the vulnerability and then to clear the break in tracks. It provides techniques and tool to ensure the security of computer network and applications. The student performs hands on in the virtual environment using Windows and Linux guest operating system.
10) CCCY 512 Cybersecurity Operation
Detecting cybersecurity breaches and effectively responding to cyber incidents are major challenges to organizations. This module is designed to help students in acquiring the knowledge and skills needed to work in Security Operations Center (SOC) team. Students will learn to monitor, detect, investigate, analyze, respond and handle cyber incidents to ensure the protection of IT systems from cyber risks and vulnerabilities.
11) CCCY 521 Computer Forensics
This course provides an overview of the computer forensics and the investigation of digital crime-scenes. Various digital crime-scenes are investigated throughout the course including emails, networks, cell phones and mobile devices. Tools for conducting investigations are introduced in the course.
1) CCCY 531 Machine Learning for Cybersecurity
The course introduces the fundamentals of machine learning and its applications in cybersecurity. The course explorer’s various domain of machine learning like time series analysis and ensemble modeling. It provides implementation of the learned concept in various applications using python and its libraries. These applications are bypassing defensive technologies, building system to identify malicious URLs, writing programs for detecting frauds emails e.g. spams and to detect and generate alarm if any malicious activity if found on the network and pattern recognition. The applications are implemented using supervised learning approach, Naïve Bayes and k means algorithms. Finally, this course introduces Scikit Learn to learn the necessity of deep learning in designing models and training the system to detect fraud events.
2) CCCY 532 Reverse Engineering & Malware Analysis
This course focus on both theoretical and practical perspectives in malware analysis and reverse engineering. The aim of the module is to teach students to learn how to analyze malware once it has been found it also teach students how and when to use various malware analysis techniques. Understanding when to use a particular technique can be as important as knowing the technique. The module has divided into three sections beginner, intermediate and advanced. In the beginning it discuss basic malware analysis techniques, intermediate is about introduction material that will arm students with the major tools and skills needed to analyze most malicious programs and in the last more advanced material will covers strategies and techniques for analyzing even the most sophisticated malicious programs.
3) CCCY 533 IT Security System Auditing
This course will help students to understand concepts, strategies and best practices in IT auditing and controls. Students will learn how to formulate and execute audit strategies based on well-known IT audit standards and guidelines to uncover system vulnerabilities. Students will also familiarize with IT audit report documentation according to standard of compliance-based auditing.
4) CCCY 534 Mobile and Wireless Communication Security
This course investigates and analyzes the security solutions in mobile and wireless network. It starts by providing the knowledge that is essential to understand the issues and solutions in mobile and wireless network with respect to security. It discusses the security problems and solutions for the off-the-shelf wireless and mobile technologies like 2G, 3G, 4G, WiFi, Bluetooth and WiMAX. It also covers the security mechanism that are used for the protection of the android applications downloaded via cellular network by mobile phones.
5) CCCY 535 Advanced Topics in Cybersecurity
The course is a senior undergraduate course with the interest of introducing the student to the state of the art a in the area of cybersecurity and therefore the course will include recent research topics and development from the field of cybersecurity.
6) CCDS 536 Database Administration
This course will help students to explore advanced concepts of databases in context of design, administration and applications. Topics included in this course are: database architecture, modeling, designing, implementation, backup and recovery procedures, security, change management and performance management.
7) CCCY 537 Cyber Physical Security
The course introduces the fundamentals of Cyber Physical Systems (CPSs) and its working. The course explorer’s traditional and state of the art security and privacy issues to Cyber Physical System with further detailed in network security of CPSs. It highlights the national security concerns and its implication of Cyber Physical Systems. It provides quantifying the privacy of Cyber Physical System. It elaborates the working of two main application of Cyber physical system the Smart Grid and IoT devices and discuss the security and privacy issues.
8) CCCN 511 Cloud Computing
This course will provide a definition of cloud computing. Various service delivery models of a cloud computing architecture will be described. In addition, the ways in which clouds can be deployed as public, private, hybrid, and community clouds will be introduced. Finally, a much deeper review of the security and privacy issues related to cloud computing environments will be discussed.
9) CCCY 539 Cybersecurity Governance
The course introduces the fundamentals of Cybersecurity governance. It describes the cybersecurity governance control framework and its use cases. It discusses the strategies and policies of cybersecurity governance. It discusses the role and responsibilities of cybersecurity team. The course further elaborates the risk and program management policies and highlights security metric modeling.
10) CCCAI 320 Artificial Intelligence Fundamentals
This course aims to establish basic elements of theory, practice and applications of artificial intelligence. The course covers main aspects of artificial intelligence such as artificial intelligence philosophy and perspectives, intelligent agents, solving problems by intelligent systems, intelligent search, knowledge representation, as well as its applications such as games and robotics.
11) CCCY 541 Multimedia Security
This course provides an overview of digital multimedia information (text, audio, image and video) and its applications. Concepts and structure of multimedia data types and their compression technologies will be discussed. Digital multimedia encryption, watermarking, steganography principles will be introduced, and the respective algorithms will be discussed. Biometric features and their technologies are significant technologies for authentication, while video surveillance and sensor networks ensure trustworthiness of multimedia data
12) CCCY 542 Network Administration
This course will help students to understand the concepts of network administration and the skills needed to administrate switches and routers that form a network core. This course will cover IP addressing design and subnetting. It will explore routing protocols i.e. RIPv2, EIGRP and OSPF; Spanning Tree Protocol (STP); Link Aggregation and Hop Redundancy Protocol. One of the important parts of this course would be network security and monitoring. This course would also highlight important points on network quality of service (QoS).
13) CCCY 543 Secure Programming
This course introduces the principles and practices of secure programming. It explains the vulnerabilities in code and how-to write program in safe fashion with no known vulnerabilities that can be exploited by hackers. The course introduces the stages of coding with emphasis on building code that repels attacks. These stages are architecture, design, implementation, testing and operations. In the last the course introduces the practices that can be adopted for secure programming practice in Java and web programming.
3/5/2019 7:03:43 AM