Master of Cyber Security Course Description


CSA 580 Research Methodology and Project Preparation
This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.

CSA 581 Cyber Security Standards and Policies
The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizationsto practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 582 Telecommunication and Data Communication
This course teaches students about fundamentals of the technology, transmission systems, voice communication systems, messaging systems, and public switched telephone network. Student will also learn about fundamentals of data communications, conventional digital and data networks, local area networks, broadband network infrastructure and services, wireless networking with the emphasis on mobility, video and multimedia networking, the Internet and World Wide Web, network convergence. The course also covers regulation such as Telecommunications Act of 1996 as well as certain issues. Credits: ECTS: 5 US: 2,5. Prerequisite: None.

CSA 583 Network Security
This course teaches students about network security whose main purpose is to secure the network, and protect and oversee operations being done. Network security is involved in organizations, enterprises, and other types of institutions. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Students will be introduced to the provisions and policies that are an integral part of network security. Network administrator adopts those provisions and policies in order to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. This also involves the authorization of access to data in a network. The course introduces students to intrusion detection system and intrusion prevention systems and their main differences. Credits: ECTS: 5 US: 2,5. Prerequisite: None.

CSA 584 Computer and System Intrusion
This course teaches students about computer and system intrusion, types of intrusion, its detection as well as prevention systems and its classifications. In addition methods and tactics used in prevention of the intrusion will be covered. The course will also cover the following topics: hacking, E-Crime (or cyber crime) and e-Discovery. Hacking involves finding out weaknesses in a computer or computer network. Classifications, tools and techniques of hacking are covered. E-Crime or (or cyber crime) refers to any crime that involves a computer and a network. E-Discovery refers to discovery in civil litigation, which deals with the exchange of information in electronic format. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Credits: ECTS: 5 US: 2,5. Prerequisite: None.

CSA 585 Wireless Security
This course teaches students about wireless security. The risks to users of wireless technology have increased as the service has become more popular. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The course emphases that wireless security policies should be defined by enterprises in order to prevent unauthorized access to important resources. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 586 Information Security
The course teaches students about information security as well as information assurance. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Information security is concerned with the confidentiality, integrity and availability of data and systems regardless of the form the data may take: electronic, print, or other forms. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. The course also teaches about physical, electromagnetic (TEMPEST) and personal security. Physical security refers to protection of information systems. Personal security refers to personal security clearance and screening, their scope of action, ect. Credits: ECTS: 5 US: 2,5. Prerequisite: None.

CSA 590 Mobile Devices Security
The course teaches students about mobile devices security. Mobile devices security relates to the security of personal information stored on smartphones. Smartphones, used as communication tools and a means of planning and organizing professional (work) and private life are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, Wi-Fi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. There are also are forms of malicious software that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end-users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable applications.Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 591 Law in Cyber Crime
This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 592 Digital Forensics
Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The course explores digital forensics, its history, forensic process, application, legal considerations and branches. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence. Digital forensics investigations have a variety of applications. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: a) computer forensics, b) network forensics, c) database forensics and d) mobile device forensics. Computer forensics pertains to legal evidence found in computers and digital storage media. Network forensics relates to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Database forensics relates to the forensic study of databases and their metadata. Mobile device forensics relates to recovery of digital evidence or data from a mobile device. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 593 Industrial Network Security
This course teaches students about industrial network security. Students will study about industrial network, its protocol, how it operates, application characteristics of an industrial control system, as well as a variety of common compliance controls. Students will learn to identify why security controls should be implemented, where they should implemented, how they should be implemented, and how they should be used. Topics covered include how secure enclaves are established, monitored, anomaly and threat detection, standards and regulations applicable to industrial network security, as well as common mistakes and pitfalls that occur within industrial control system. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 594 Internet Security
This course teaches students about Internet security. Internet security involves browser security and network security on a more general level as it applies to other applications or operating systems on a whole. Objective of Internet security is to establish rules and measures in order to use it against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. Topics covered in the course include: a) Types of security (network layer security, IPsec Protocol, security token, E-mail security); b) Firewalls (their role, types, ect.); c) Malicious software and antivirus; d) different types of attack; e) security management of Web applications and Web services; ect. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 595 Cyber Surveillance
The course introduces students to cyber surveillance, a technique for monitoring computer activity, which includes monitoring of date stored on a hard drive or being transferred over computer networks. Cyber surveillance operates on data networks. Cyber surveillance also includes gathering and analyzing information recorded. Students will be also introduced to surveillance and security as a study, surveillance theories as well as with types of cyber surveillance. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 600 Master’s Project: Cyber Security
Credits: ECTS: 6 US: 3. Prerequisite: CSA 580 Research Methodology and Project Preparation.