department menu

Learning Outcomes

MATH 503 (3)

Cryptography

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Identify basic structures of cryptographic algorithms from a mathematical and computer scientific viewpoint.
  2. Describe the common cryptographic protocols used to protect information.
  3. Identify common flaws in cryptographic regimes.
  4. Apply current/common cryptographic technologies and controls for authentication and encryption.
  5. Communicate their analyses and decisions effectively.

Restriction: May not be counted towards the Master's degree in Mathematics.

Prior knowledge required:

• Discrete mathematics (counting, set theory, modular arithmetic)
• Elementary probability.
• Familiarity with functions, especially exponential and logarithmic

MCS 510 (3)

Security in Computer Networks

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Recognize design and analysis of network security architectures, protocols, and services in both wired and wireless networks.
  2. Identify network security standards, their functionality and limitations.
  3. Identify network attacks and analyze defense techniques against them.
  4. Apply and operationalize network security technologies and techniques.
  5. Communicate their analyses and decisions effectively.

Prerequisite: MATH 503.

Prior knowledge required:

  • A fundamental understanding of networking concepts.
  • A basic understanding of the standard protocols and services provided by the various layers of the protocol stack.
  • Some limited programming experience with languages or scripts such as C/C++,  Java, Perl, PHP, Python
  • Familiarity with the architecture and features of a LAN and WAN, such as the Internet
  • A fundamental understanding of network security and the basics of Common Gateway Interface (CGI) and web application programming.

MCS 511 (3)

Secure Features in Operating Systems

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Identify fundamental security features in a modem operating system.
  2. Analyze threats behind operating system security.
  3. Identify vulnerabilities of a computer system.
  4. Develop and apply appropriate techniques for operational security.
  5. Communicate their analyses and decisions effectively.

Prior knowledge required:

  • A fundamental understanding of modern operating system design and implementation.
  • A basic understanding of operating system structure and operation including process management, memory management, storage management as well as current protection and security mechanisms.
  • A solid background using various operating systems interfaces, system calls, system programs and operating system debugging/monitoring.
  • Familiarity with a command line interface such as a Linux shell is encouraged. Some limited programming experience using C/C++, Java or shell programming would be beneficial.

MCS 512 (4)

Development of Secure Software

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Identify security issues in current programming languages and methods.
  2. Evaluate applications using secure coding standards.
  3. Perform application risk assessment of existing systems.
  4. Communicate their analyses and decisions effectively.

Prior knowledge required:

  • Experience using at least one modern programming language (not a scripting language).
  • Knowledge of common features in modern programming languages.

MCS 610 (4) 3 hours lecture 3 hours lab

Offensive Security & Penetration Testing

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Define and use the terms used in penetration testing.
  2. Describe the steps in penetration testing.
  3. Choose and apply the right penetration technique for a given situation.
  4. Choose and apply the right penetration tools for a given situation.
  5. Describe the required content of a report after penetration testing.

Prerequisites:  MCS 510, 511, 512.

MCS 611 (4)

Intrusion Detection and Incident Response

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Understand and identify threats against computers and network systems.
  2. Analyze and evaluate network traffic, system logs.
  3. Describe principles of incident response and incident management.
  4. Develop incident reports and analysis presentations.

Prerequisites: MCS 510, 511, 512.

MGMT 521 (2)

Principles of Organizational Behavior and Leadership for Security Management

Learning outcomes:

Upon successful completion of the course, students will be able to:

  1. Distinguish between the main concepts and theories of
  2. Organizational Behavior (OB) and Leadership in the context of security management.
  3. Apply key OB and Leadership concepts to real world situations in cybersecurity.
  4. Analyze and describe responses to security incidents in terms of OB and Leadership theories and concepts.
  5. Recognize OB and Leadership related traits and perspectives.
  6. Communicate their analyses and decisions effectively.

MIS 522 (2)

Information Systems and Security Management

Learning outcomes:

  1. Upon successful completion of the course, students will be able to:
  2. Identify information systems and key business strategies
  3. Describe the principles of information technology security.
  4. Analyze data value in business context.
  5. Describe the components of information security management and how the elements
  6. interact
  7. Evaluate different methods for access control.
  8. Identify appropriate strategies to assure confidentiality, integrity, and availability of information.
  9. Communicate their analyses and decisions effectively.

MIS 621 (3)

Secure System Governance, Regulation, and Compliance

Learning outcomes:

Upon successful completion of the course, students will be able to

  1. Identify the role of an information systems security (ISS) policy framework.
  2. Analyze how security policies help mitigate risks and support business.
  3. Identify components and basic requirements for creating a security policy framework.
  4. Identify different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of security policy framework.
  5. Develop ISS policies associated with the user domain, IT infrastructure, risk management and incident response teams (IRT).
  6. Analyze social, legal and ethical issues represented by information technology environments.

Prerequisites: MGMT 521 and MIS 522.

MIS 622 (3)

Technology Assessment and Security Risk Management

Learning outcomes:

Upon successful completion of the course, students will be able to

  1. Analyze and communicate appropriate financial, economical, and business models to assess technology investment decisions.
  2. Describe the fundamental concepts of Risk Management and Risk Management Life Cycle.
  3. Identify Risk Management Artifacts in an organizational environment.
  4. Conduct a Business Impact Assessment and develop a Security Risk Management plan.
  5. Compare the difference between qualitative and quantitative risk analysis methods and apply appropriate methods to the right situation.
  6. Describe the procedure for periodical security risk review .
  7. Evaluate and justify security technology selections and designs.
  8. Evaluate and apply common risk management frameworks.

Prerequisites:  MGMT 521 and MIS 522.