This course provides an understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers; defining what an ethical hacker is and who employs them. Topics will include gathering information and identifying flaws and vulnerabilities in documentation, software, and computer systems, and exploiting those flaws. Students will be provided with an overview of computer crime laws.
Overview of computer network security, broad coverage of cyber security concepts, computer network defense, computer network attack, and wireless security.
This course presents the student with issues of law and ethics in cyberspace and cyber warfare. Students will learn the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet, in addition to providing students with the skills to assess future ethical dilemmas for themselves. Topics covered include government regulation of online behavior, constitutional considerations concerning free speech and content controls, intellectual property, hacking, and the ethics of internet behavior.
An overview of forensics including methods to uncover and exploit digital evidence; cyber crime, forensics analysis techniques.
Overview of wireless and mobile security providing students with practical and theoretical experiences. Topics include threat analysis, security infrastructure, security services, wireless network security components.
Overview of reverse engineering techniques, modern tools for reverse engineering of machine code. Topics include gathering information, PE32 format, obfuscation techniques, memory dumping, and automating processes.
An introduction to the basic theory and practice of cryptographic techniques used in computer security. Topics include probability and statistics, encryption, key management, hashing, and network security protocols.
Overview of security assessment, network operations, and security protocols.
Overview of distributed computing. Theoretical and applicable aspects of distributed systems and cloud computing. Modeling aspects including architecture, performance, reliability, availability, service models, security characteristics.
An overview of access control logic and covert channels. Topics include access control concepts and logic, covert channel detection, future security predictions, steganography, steganalysis, data hiding.
Principles and concepts of industrial security infrastructure. Topics include PLC programming, SCADA systems, firewalls, segregation of corporate and industrial networks.
Overview of industrial security, broad coverage of cyber security concepts, industrial network defense, industrial network attack, and wireless security.
Introduction to data analytics; key tools and concepts from the functional, technical, and implementation perspective of using data analytics to solve real world challenges.
the course covers all aspects of cryptocurrencies, including distributed consensus, blockchains, smart contracts and applications; focusing on Bitcoin and Ethereum as case studies. Prior background in Python within a Unix environment is recommended, but no previous Bitcoin knowledge is necessary.