Courses in Information Security


Information Security Courses

The program offers several elective courses, focusing on different aspects of security. A student can choose to do any set of courses from these to satisfy his/her specialization requirement of 16 credits. Some of the important courses that a student can expect to do during this program are given below.

  1. Applied Cryptography
    • CSE546 (AC) : 4 credits
      Applied Cryptography
      Pre-requisites: Discrete Mathematics and C Programming
      A wide array of communication and data protections employ cryptographic mechanisms. This course explores modern cryptographic (code making) and cryptanalytic (code breaking) techniques in detail. This course emphasizes how cryptographic mechanisms can be effectively used within larger security systems, and the dramatic ways in which cryptographic mechanisms can fall vulnerable to cryptanalysis in deployed systems. Topics covered include cryptographic primitives such as symmetric encryption, public key encryption, digital signatures, and message authentication codes; cryptographic protocols, such as key exchange, remote user authentication, and interactive proofs; cryptanalysis of cryptographic primitives and protocols, such as by side-channel attacks, differential cryptanalysis, or replay attacks; and cryptanalytic techniques on deployed systems, such as memory remanence, timing attacks, and differential power analysis.

  1. Digital and Cyber Forensics
    • CSE645 (DSF) : 4 credits
      Digital and Cyber Forensics
      Pre-requisites:
      Host-Based Forensics provides a systematic introduction to the field of digital forensics. The course aims to familiarize students with the forensic process and to apply forensic principles with many tools of the trade. Upon completion of this course, a student should feel confident in participating in a digital forensic investigation. This course focuses on the forensic process (planning, acquisition, analysis, reporting) as it relates to host system forensics. This course will also concentrate on providing introduction to cyber crime and on the collection and analysis of evidence left on the cyber world. A student will feel comfortable with the full scope of a cyber forensic investigation. Class periods will consist of lecture and exercise. Students will learn about the data types that may have forensic value; and will be introduced to several techniques for capturing data off the network and how each option impacts the data that is available. Students will be further presented with several incident response challenges on live networks and be tasked with determining and proving what happened. They will have to collect various logs, network traffic, create timelines, and draw conclusions.

  1. Distributed Systems Security
    • CSE530 (DIST) : 4 credits
      Distributed Systems Security (Graduate)
      Pre-requisites: Operating Systems, Networking
      The aims of this course are to study the fundamental characteristics of distributed systems, including their models and architectures; the implications for software design; some of the techniques that have been used to build them; and the resulting details of good distributed algorithms and applications.

  1. Foundations of Computer Security
    • CSE545 (SECURITY) : 4 credits
      Foundations of Computer Security (Graduate)
      Pre-requisites: Computer Networks, Operating Systems
      This course provides a principled introduction to techniques for defending against hostile adversaries in modern computer systems and computer networks. Topics covered in the course include operating system security; network security, including cryptography and cryptographic protocols, firewalls, and network denial-of-service attacks and defenses; user authentication technologies; security for network servers; web security; and security for mobile code technologies, such as Java and JavaScript. More advanced topics will additionally be covered as time permits, such as: intrusion detection; techniques to provide privacy in Internet applications; and protecting digital content (music, video, software) from unintended use.

  1. Mobile and Cellular Network Security
    • CSE647 (MCNS) : 4 credits
      Mobile and Cellular Network Security
      Pre-requisites: Computer Networks
      Cellular phones and their supporting networks now represent the most widely available computing and communications technologies. The number of user of these networks outnumbers the number of users of conventional desktops and laptops. The objective of this course is to understand how these systems function and the security challenges facing them. This course provides an in-depth investigation into security issues in areas including cellular air interfaces, core networking (SS7, IMS), cellular data networking, and mobile device architectures. The course will focus more on security aspect of technologies including GSM, CDMA and futuristic LTE.

  1. Secure Coding
    • CSE500 (SC) : 4 credits
      Secure Coding
      Pre-requisites: C/C++/Java
      This class takes a close look at software as a mechanism for attack, as a tool for protecting resources, and as a resource to be defended. Some topics to be included are secure coding rules and recommendations (Examples in C, C++ and Java will be included for each, if applicable), security in the software development life-cycle, secure development principles, tools for static & dynamic analysis, & hacking tools.

Some other courses that could be offered are listed below.

  • Network Security: This course provides an in-depth study of network attack techniques and methods to defend against them.
  • Human Aspects of Information Security : This course will motivate the necessity for more work in the area of usable privacy and security.
  • Database Security and Privacy: This course will focus on how to keep data (residing in databases or otherwise) secure and also how to preserve the privacy of such data.
  • Managing Information Security : This course will address questions like: Who are the stakeholders in the information security landscape? Who has the incentive to solve the information security problems?
  • Information Security in Practice: Industry leaders will teach this course; this course will cover topics from telecommunication industry and financial/banking industry.