College of Engineering

CyberSecurity Courses

Course Descriptions for the Undergraduate Certificate in Cybersecurity

COMP 320. Fundamentals of Information Assurance                                              Credit 3(3-0)

This course covers concepts in computer network and information security. Topics include: software strategies for exchanging secure data and encryption standards. Strategies for the physical protection of information assets are explored. Issues involving information security management within an enterprise are covered, including suitable organizational policy, plans, and implementation strategies. Ethical issues, such as monitoring employee computer use and proper limitations on the use of customer data, are also discussed. Prerequisite: COMP280 (F;S;SS)

COMP 420. Applied Network Security                                                                        Credit 3(3-0)

This course covers network security concepts and various network security practices and solutions. Topics include cryptography, Public Key Infrastructure (PKI), taxonomy of various attack methods, firewalls, intrusion detection and prevention, Internet Protocol (IP) security, and web security. Prerequisite: COMP285 (F;S;SS)

CRJS485 Special Topics: Cybercrime and Investigation                                         Credit 3(3-0)

With computers becoming commonplace and being linked to networks there are growing threats of cybercrime at the national and international level. This will be a cross-disciplinary course (computer science & criminal justice) that looks at the emerging crimes which are either singular or ongoing and involve the theft and/or destruction of information, resources, or funds due to the utilization of computers, computer networks, and the Internet. It will examine the various developments in the field of hardware and software and their contribution to the growth of the Internet and online services for consumers. The role of federal agencies such as the FBI, U.S. Secret Service with respect to jurisdiction and investigative functions regarding cybercrime will be examined. The specific role, composition, and function of enforcement agencies such as the Electronic Crimes Task Forces (ECTF), Interagency Telemarketing and Internet Fraud Working Group, and the Internet Fraud Complaint Center will be delineated. The mission of the cybercrime enforcement agencies with respect to the prevention and detection of attacks on the U.S. financial institutions and critical structures will also be examined.

ECEN 452 Wireless Communication Systems                                                           Credit 3(3-0)

This course is an introductory level of wireless communications. Fundamental theory and analysis of wireless mobile communication systems are introduced, including characterization of radio propagation, channel modeling and coding, and a summary of wireless communication standards and multiple access techniques. Also covered are an overview of information networks and a comparison of wireless and conventional communication systems. Prerequisite: ECEN 400. (F)

ISEN 380. Information Technology for Industrial and Systems Engineers          Credit 3(2-2)

This course introduces the planning and design techniques used for enterprise information systems. The course addresses basic concepts of database systems, network systems, system analysis and planning, and human-computer systems. Systems concepts, fundamentals of VBA, and the role of computers in industrial and systems engineering are stressed. Prerequisite: ISEN 162.

COMP 620. Information, Privacy and Security                                                          Credit 3 (3-0)

This course examines the security and privacy issues associated with information systems. There are cost/risk tradeoffs to be made. Topics discussed include technical, physical, and administrative methods of providing security, access control, identification, and authentication. Encryption is examined, including Data Encryption Standards (DES) and public key cryptosystems. Management considerations such as key protection and distribution, orange book requirements, and OSI data security standards are covered. Privacy legislation is covered, as is current cryptographic research.

COMP 621. Web Security                                                                                               Credit 3 (3-0)

This course focuses on the technologies that provide security services for the World Wide Web. It introduces a set of procedures, practices, and technologies for protecting web servers, web users, and their surrounding organizations. We discuss, understand and use various security technologies for the World Wide Web (WWW). How to use these technologies to secure WWW applications will be addressed.