Courses
The graduate certificate in cybersecurity requires a total of 12 credit hours of graduate-level computer science and or electrical and computer engineering courses taken for a grade. There is no prescribed list of courses for the certificate; students may take a combination of courses tailored to their interests and needs, subject to course prerequisites.
Students may take a combination of courses tailored to their interests from among the available Core and Elective courses listed below, subject to course prerequisites.
Required Courses (the following two courses must be taken):
CSC 574 - Computer and Network Security
Units: 3
This course presents foundational concepts of computer and network security and privacy. It covers a wide breadth of concepts, including; Fundamentals of computer security and privacy, including security models, policies, and mechanisms; Cryptography for secure systems, including symmetric and asymmetric ciphers, hash functions, and integrity mechanisms; Authentication of users and computers; Network attacks and defenses at the network and application layers; Common software vulnerabilities and mitigation strategies; Secure operating systems and seminal access control models and policies; Principles of intrusion detection; Privacy, including considerations of end-user technologies.
Offered in Fall and Spring
CSC 595 - Cybersecurity Practicum
Units: 3
Application of cybersecurity principles and computer science and engineering to solve a cybersecurity problem. A project with comprehensive written and oral project report is required. Enrollment is open to Graduate Certificate in Cybersecurity [CYS GCP] students and CSC and ECE majors only.
Offered in Fall Only
Additional Courses (any two of the following elective courses must be taken):
CSC 514 - Foundations of Cryptography
Units: 3
Cryptography is the study of mathematical techniques for securing digital information, systems and distributed computation against adversarial attacks. In this class you will learn the concepts and the algorithms behind the most used cryptographic protocols: you will learn how to formally define security properties and how to formally prove/disprove that a cryptographic protocol achieves a certain security property. You will also discover that cryptography has a much broader range of applications. It solves absolutely paradoxical problems such as proving knowledge of a secret without ever revealing the secret [zero-knowledge proof], or computing the output of a function without ever knowing the input of the function [secure computation]. Finally, we will look closely at one of the recent popular application of cryptography: the blockchain technology. Additionally, graduate students will study some of the topics in greater depth.
Offered in Fall Only
CSC 515 - Software Security
Units: 3
Introduces students to the discipline of designing, developing, and testing secure and dependable software-based systems. Students will learn about risks and vulnerabilities, and effective software security techniques. Topics include common vulnerabilities, access control, information leakage, logging, usability, risk analysis, testing, design principles, security policies, and privacy. Project required.
Offered in Spring Only
CSC 533 - Privacy in the Digital Age
Units: 3
Privacy is a growing concern in our modern society. We interact and share our personal information with a wide variety of organizations, including financial and healthcare institutions, web service providers and social networks. Many times such personal information is inappropriately collected, used or shared, often without our awareness. This course introduces privacy in a broad sense, with the aim of providing students an overview of the challenging and emerging research topics in privacy. This course will expose students to many of the issues that privacy engineers, program managers, researchers and designers deal with in industry. ST 370 is recommended but not mandatory.
Offered in Fall Only
CSC 537 - Systems Attacks and Defenses
Units: 3
This class will: explore several aspects of security research with the goal of understanding the attacker's mindset; help the students to develop a foundation and a well-rounded view of security research; and cover some of the state-of-the-art attack/defense techniques and ongoing research activities in a number of topics in software security, web security, privacy and network security.
Offered in Spring Only
CSC 705 - Operating Systems Security
Units: 3
Fundamentals and advanced topics in operating system [OS] security. Study OS level mechanisms and policies in investigating and defending against real-world attacks on computer systems, such as self-propagating worms, stealthy rootkits and large-scale botnets. OS security techniques such as authentication, system call monitoring, as well as memory protection. Introduce recent advanced techniques such as system-level randomization and hardware virtualization.
Offered in Spring Only
CSC 774 - Advanced Network Security
Units: 3
A study of network security policies, models, and mechanisms. Topics include: network security models; review of cryptographic techniques; internet key management protocols; electronic payments protocols and systems; intrusion detection and correlation; broadcast authentication; group key management; security in mobile ad-hoc networks; security in sensor networks.
Offered in Spring Only
ECE 592 - Special Topics In Electrical Engineering
Units: 1 - 6
Two-semester sequence to develop new courses and to allow qualified students to explore areas of special interest.
Offered in Fall and Spring