• CSCE 201 - Introduction to Computer Security (syllabus)
    • Provides a set of practices to the students to deploy security for their computers and maintain safe security practices.Necessary security concepts and methods to prevent security breaches and what to do if such a breach is detected.Complete security lab exercises, hands-on experiments on safe security practices. The hands-on experiences helps students to deal with security threats and to apply appropriate counter measures.
  • CSCE 517 - Computer Crime and Forensics (syllabus)
    • Methodical approaches for collecting and preserving evidence of computer crimes. Foundational concepts such as file system structures, MAC times, and network protocols, tools for extracting evidence, general legal issues.
  • CSCE 518 - Ethical Hacking
    • Fundamental principles and techniques of ethical hacking, including penetration testing life cycle, planning and scoping, identifying targets and goals, active and passive reconnaissance, enumeration and scanning, exploitation, post-exploitation, and results reporting.
  • CSCE 522 - Information Security Principles (syllabus)
    • Threats to information resources and appropriate countermeasures. Cryptography, identification and authentication, access control models and mechanisms, multilevel database security, steganography, Internet security, and intrusion detection and prevention.
  • CSCE 548 - Building Secure Software (syllabus)
    • Construction of software systems resistant to vulnerabilities and attacks. Cryptographic tools. Language, operating system, and network security. Case studies. Development of best practices through programming assignments.
  • CSCE 557 - Introduction to Cryptography (syllabus)
    • Design of codes and ciphers for secure communication, including encryption, authentication, and integrity verification: codes, ciphers, cryptographic hashing, and public key cryptosystems. Cryptological mathematical principles, cryptanalysis, and protocols for security.
  • CSCE 715 - Network Systems Security (syllabus)
    • Analysis of security threats in TCP/IP networks. Design of safeguards. Coverage of security threats at each of the OSI layers. Application of cryptographic protocols for secure communication across a network
  • CSCE 717 - Computer Systems Performance and Reliability Analysis (syllabus)
    • Evaluation of computer system performance and reliability using reliability block diagrams, fault trees, reliability graphics, queuing networks, Markov models, and Markov reward models.
  • CSCE 727 - Information Warfare (syllabus)
    • Current trends and challenges in information warfare. High-level analysis of information warfare threats, like cyber terrorism, espionage, internet fraud, intelligence activities, cyber ethics and law enforcement.
  • CSCE 790S - Theory of Quantum Computing and Information (syllabus)
    • The fundamentals of quantum information processing, including quantum computation, quantum cryptography, and quantum information theory.
  • CSCE 790 Security and Privacy for Emerging Ubiquitous Communication system (syllabus)
    • This course will be an introduction to the security and privacy issues associated with wireless networks. The format of the course will be a combination of formal lectures, paper reading and student presentation. The instructor will first give overview lectures on the background, and then students will present papers in the field.
  • CSCE 813 - Internet Security (syllabus)
    • Study security threats and prevention/detection/response techniques on the Internet, including hackers, masqueraders, information spoofing, sniffing, and distribution of damaging software. Security analysis of Web applications.
  • CSCE 814 - Distributed Systems Security (syllabus)
    • Security mechanisms of distributed software systems, including cryptographic applications. Secure multiparty computation, group-based cryptography, and security mechanisms for emerging distributed architectures.
  • CSCE 824 - Secure Database Systems (syllabus)
    • Security threats to database systems. Access control models, multilevel security, integrity, web-based databases, and data inference problem. Formal models of multilevel security, confidentiality versus availability and integrity.