Course Sequence

Bridge Courses

1 year of Programming in C++
Discrete Mathematics
A two-course sequence in Calculus
Statistics
Two courses in Natural Sciences
NSSA-241 Networking I or Equivalent
NSSA-322 Systems Administration II or Equivalent

Core Courses

CSEC-601 Research Methods and Proposal Development

It is important that students in this graduate program be able to perform in depth literature review, understand and apply different fundamental research methods in computing security areas. This course is designed to help students in this direction. Students will be encouraged to investigate the continuing computing security problems, that arise due to vulnerabilities in software and hardware, and malicious cyber-attacks by adversaries. This will provide the foundations for the student to decide on a project/thesis topic. Invited talks from faculty and members from other institution to share their research and scholarship work will seed such research thinking. Students will be encouraged to interact with faculty members to formulate their project / thesis topics and scope. Students will be expected to develop a research proposal that may serve as the basis for their later project/thesis proposal. In addition, this course provides an overview of the academic research methodologies used in graduate level work. Topics include but are not limited to: experimental research, correlation, experiment observation, surveys, and case studies. Also included will be document structure, validation, and the process for submission and review to conferences and journals. Class 3, Credit 3 (F)

CSEC-603 Enterprise Security

This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community. Class 3, Credit 3 (Fall Spring)

CSEC-604 Cryptography and Authentication

In this course, students will learn in depth knowledge of cryptography and authentication. Students will explore various cryptography algorithms, authentication protocols, and their design and implementation. Students will work on a project to implement a cryptographic algorithm and/or an authentication protocol. The applications of cryptography and authentications in the areas of computer networks and systems and information assurance will also be investigated. Class 3, Credit 3 (Fall, Spring)

Electives

CSEC-730 Advanced Computer Forensics

This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess knowledge of available file systems on both platforms. Class 3, Credit 3 (Fall, Spring)

CSEC-731 Web Server and Application Security Audits

This course discusses the processes and procedures to perform a technical security audit of web servers and web based applications. Students will not only explore Web Servers and Applications/Services threats, but also apply the latest auditing techniques to identify vulnerabilities existing in or stemming from web servers and applications. Students will write and present their findings and recommendations in audit reports on web servers and application vulnerabilities. To be successful in this course students should be knowledgeable in a scripting language and comfortable with the administration of both Linux and Windows platforms. Class 3, Credit 3 (Spring)

CSEC-732 Mobile Device Forensics

Techniques and limitations related to the seizure and interrogation of a variety of digital devices will be explored. Various mobile phone and tablet platforms will be interrogated with the intent of gaining better access and understanding of the organization of data in the devices. The infusion of digital storage and identification devices such as MP3 players, RFID and tokens into our everyday lives requires the study of their weaknesses and forensic exploitability. As personal information is frequently gathered and stored on these devices, the loss of a device could adversely affect individuals and organizations. The examination, collection, and removal of such information will be studied. To be successful in this course students should be knowledgeable in basic networking, systems, and security technologies. Class 3, Credit 3 (Fall, Spring)

CSEC-733 Information Security Risk Management

This course will provide students with an introduction to the principle of risk management and its three key elements: risk analysis, risk assessment and vulnerability assessment. Students will also learn the differences between quantitative and qualitative risk assessment, and details of how security metrics can be modeled/monitored/controlled and how various types of qualitative risk assessment can be applied to the overall assessment process. Several industry case studies will be studied and discussed. Students will work together in teams to conduct risk assessments based on selected case studies or hypothetical scenarios. Finally, they will write and present their risk assessment reports and findings. Class 3, Credit 3 (Fall, Spring)

CSEC-741 Sensor and SCADA Security

This course is designed to provide students with knowledge of sensor network security with respect to practical implementations. In particular, secure sensor network design for Supervisor Control And Data Acquisition (SCADA) is discussed. SCADA encompasses technologies that manage and control much of the infrastructure that we depend on every day without realizing it. The failure or corruption of SCADA systems can not only be inconvenient but also hazardous when the resource is critical or life threatening. Securing SCADA systems is of great strategic importance. The role of sensor networks in SCADA is discussed and sensor security protocols for SCADA applications are evaluated and studied. To be successful in this course students should be knowledgeable in basic networking, systems, and security technologies. Class 3, Credit 3 (Spring)

CSEC-742 Computer System Security

The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. Class 3, Credit 3 (F)

CSEC-743 Computer Viruses and Malicious Software

Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense. Class 3, Credit 3 (Spring)

CSEC-744 Network Security

Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies. Class 3, Credit 3 (Fall, Spring)

CSEC-750 Covert Communications

Students will be introduced to the history, theory, methodology and implementation of various kinds of covert communications. Students will explore future techniques and uses of covert communications. More specifically students will explore possible uses of covert communications in the management of botnets. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. Class 3, Credit 3 (Fall, Spring)

CSEC-751 Information Security Policy and Law

This course explores Information Security Policy development and deployment as well as Laws (US and International) that impact Information Security. Students in this class will develop policies and analyze how policy impacts an organization. Students will also determine how Federal, State, and international laws impact the Information Security Policies of an organization. Class 3, Credit 3 (Fall and Spring)

Capstone

CSEC-790 MS Thesis

This course is a capstone course in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. As part of their original work students will write and submit for publication an article to a peer reviewed journal or conference. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. (Permission of department) Credit 1-3 (Fall, Spring, Summer)

CSEC-791 MS Project

This course is a capstone course in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic within the computing security domain. The student may complete a project for real world application or in a laboratory environment. Students must submit an acceptable proposal to a project committee (chair, and reader) before they may be registered by the department for the MS Project. Students must defend their work in an open project defense and complete a written report of their work before a letter grade is awarded. (Permission of department) Credits 1-3 (Fall, Spring, Summer)

CSEC-793 Capstone for Computing Security

Students will apply their knowledge learned through the program to solve real world problems various areas of computing security. Large size projects will be defined for students to work on throughout the semester. At the end of semester students will present their results and demonstrate their knowledge and skills in problem solving and critical thinking in a setting open to the public. (Permission of department) Class 3, Credits 1-3 (Fall, Spring)