Graduate Certificate
Information Assurance and Cybersecurity


Course Description

  • CS 736 鈥 Data Communication Networks (3- CrHrs.)
    Pre-requisites: CS 300 and IME 254
    Presents a quantitative performance evaluation of telecommunication networks and systems. Includes fundamental digital communications system review; packet communications; queuing theory; OSI, s.25, and SNA layered architectures; stop-and-wait protocol, go-back-N-protocol, and high-level data link layer; network layer flow and congestion control; routing; polling and random access; local area networks (LAN); integrated services digital networks (ISDN); and broadband networks.
  • CS 766 - Information Assurance & Security (3- CrHrs)
    Pre-requisites: CS 464 or 736 or 764
    Provides basic concepts in information assurance and security including encryption, digital certificates, security in networks, operating systems, and databases. Topics in intrusion detection, legal and ethical issues in security administration are also discussed.
  • CS 767 - Foundations of Network Security (3- CrHrs)
    Pre-requisites: CS 464 or CS 736
    Presents fundamental concepts in cryptography and network security, and discusses applications and protocols for providing confidentiality, authentication, integrity and availability in networking services and systems. Includes review of symmetric-Key cryptographic schemes such as DES and AES, public-key cryptographic schemes such as RSA and Diffie-Hellman key exchange protocol, cryptographic hash functions such as SHA, message authentication codes such as HMAC, digital signature schemes such as El-Gamal and DSS, kerberos and user authentication protocols, transport layer security and TLS, IP layer security and IPSec, and wireless security principles.

  • CS 898 AB 鈥 Privacy Enhancing Techniques (3- CrHrs)
    Pre-requisites: CS 766 or 767 or instructors permission
    Due to the recent advances in networking and communication technology and the tremendous popularity of context-based applications such as online social networks, online advertisement and location-based services, privacy of online users' communication and context is constantly at risk. Newer cyber-physical technologies, including smart-grids and advanced metering infrastructures, wireless medical devices, body area networks, wearable sensors and smart-home sensor systems promise exciting context-based systems and applications, but can be highly intrusive to the end-users' privacy.

  • CS 898 AM - Cyber-Physical Systems (3- CrHrs)
    Pre-requisites: CS731 and EE792 or instructors permission
    By operating physical components through computer networks, cyber-physical systems enhance the reliability and sustainability of traditional infrastructures, such as power grids, manufacturing systems, and health care systems. However, cyber-physical systems are vulnerable to new types of cyber attacks that can exploit the tight coupling between physical and cyber components. This seminar course covers attacks on cyber-physical systems as well as the most recent developments in cyber-physical system defense strategies

  • CS 898 AN 鈥 Cloud Computing Security (3- CrHrs)
    Pre-requisites: CS 766 or 767 or instructors permission
    Cloud computing has emerged as an efficient and economical way for resource-limited users to store and analyze massive data sets. In this computing paradigm, cloud users outsource their storage and computing tasks to a cloud server, which leases a vast computing infrastructure on an on-demand and pay-per-use basis. Therefore, users can share the cloud's resources with each other, and avoid purchasing, installing, and maintaining sophisticated and expensive computing hardware and software. Although users recognize the advantages of cloud computing, many of them are reluctant to adopt it due to privacy and security concerns. In particular, in many cases, users' data is very sensitive and should be kept secret from the cloud and external attackers. In this course, we will first review the basic principles of cloud computing, and privacy and security, and then explore the current literature in cloud computing security, including applications to healthcare, power systems, and manufacturing.