Classroom experience
Knowledge is Power
ITN261
Network Attacks, Computer Crime, and Hacking
Encompasses in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the viewpoint hackers and their attack methodologies. Includes topics about hackers, attacks, Intrusion Detection Systems (IDS) malicious code, computer crime and industrial espionage
CYSE 301
Cyber Techniques and Operations
This course focuses on tools and techniques involved in real-world cyber operations. It provides a broad range of cybersecurity concepts and essential hands-on training for students who want to become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyber attacks and defense operations.
CS 463
Crytography for Cybersecurity
This course covers mathematical foundations, including information theory, number theory, factoring, and prime number generation; cryptographic protocols, including basic building blocks and protocols; cryptographic techniques, including key generation and key management, and applications; and cryptographic algorithms--DES, AES, stream ciphers, hash functions, digital signatures.
ITP132
C++ Programming I
​This course instruction in fundamental of object-oriented programming using C. This course emphasizes program construction, algorithm development, coding, debugging, and documentation of C applications. Recommended prerequisite: ITP 100 or ITP 102
ITN260
Network Security Basics
Provides instruction in the basics of network security in depth. Includes security objectives, security architecture, security models and security layers; risk management, network security policy, and security training. Includes the give security keys, confidentiality integrity, availability, accountability and auditability.
CYSE 406
Cyber Law
This course tackles two major cyber law subjects. The first part of the course examines various U.S. laws and legal considerations that impact the digital and cyberspace worlds from traditional civil, and to a lesser extent, traditional criminal perspectives. The second part will familiarize cyber operations professionals about the extent of and limitations on their authorities to ensure operations in cyberspace are in compliance with U.S. law, regulations, directives and policies.
CS 464
Networked Systems Security
Authentication in cyber systems including password-based, address-based, biometrics-based, and SSO systems; Authorization and accounting in cyber systems; Securing wired and wireless networks; Secured applications including secure e-mail services, secure web services, and secure e-commerce applications; Security and privacy in cloud environments.
CYSE 270
Linux System for Cybersecurity
This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems. This course is the technical base for students to take cybersecurity major courses.