1. Cybersecurity Engineering Notes
Notes from Bob FarrellOther links and notes: at fog.misty.com/perry/ under "Cyber Security Links"
2. Cybersecurity Program Names
-
Cybersecurity
Information Security
Information Assurance
Information Systems Engineering
Computer and Network Security
Computer Security and Forensics
Information Security Management
Strategic Technical Management
Management of Information Systems
...
3. Carnegie Mellon Courses
Master of Science in Information Security Technology and Management
-
Computer Networks
Fundamentals of Telecommunications and Computer Networks
Packet Switching and Computer NetworksIntroduction to Computer Security
Network Security
Applied Cryptography
Secure Software SystemsHost-Based Forensics
Advanced Host-Based Forensic Analysis
Network Forensics
Advanced Network Analysis
Applied Information Assurance
Event Reconstruction and Correlation
4. University of Maryland University College Courses
Master of Science in Cybersecurity
-
Cyberspace and Cybersecurity
Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology
Prevention and Protection Strategies in Cybersecurity
Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing
Cyber Crime Investigation and Digital Forensics
Cybersecurity Capstone
5. Stevens Institute of Technology Courses
Master of Science in Cybersecurity
-
Systems Administration
TCP/IP Networks
Mobile and Pervasive Computing
Network Management
Distributed Systems
Database Management Systems
Engineering of Enterprise Software SystemsDiscrete Mathematics for Cryptography
Foundations of Cryptography
Cryptographic Protocols
Fundamentals of Cybersecurity
Privacy in a Networked World
Secure Computer Systems
Wireless Systems Security
Network ForensicsLegal Issues for the IT Professional
Risk Analysis and Economics of Security
Enterprise Security and Information Assurance
6. Virginia College Courses
Cybersecurity Master of Science
-
Math for Security Professionals
Cryptography
Viral Activity and Malware
Hardening the Operating System
Access Control Systems
Firewalls, Proxies, and Bastion Hosts
Intrusion Detection Systems
Computer Forensics
Network Traffic Analysis
Secure Transmission SystemsCompliance and Electronic Data
Psychological Profiling
Cyber Terrorism
Cyber Law and Research Methods
7. Northeastern University Courses
Master of Science in Information Assurance
-
Computer Systems
Fundamentals of Computer Networking
Wireless NetworksManaging Software Development
Database Management Systems
Foundations of Formal Methods and Software AnalysisApplied Cryptography
Foundations of Information Assurance
Computer System Security
Network Security Practices
Information System Forensics
Capstone ProjectLaw and Psychology
White Collar Crime
Terrorism and International Crime
Strategic Security Management
Security Risk Management and Assessment
Ethics, Privacy, and Digital Rights
Decision Making in Critical Infrastructure
8. Cybersecurity Course Areas
-
Networks, no emphasis on security
Software, no emphasis on security
Security
Forensics
Intrusion
Cryptography
Legal
Business
8.1. Networks, no emphasis on security
-
Computer Systems
Computer Networks
Fundamentals of Computer Networking
Fundamentals of Telecommunications and Computer Networks
Mobile and Pervasive Computing
Network Management
Packet Switching and Computer Networks
TCP/IP Networks
Wireless Networks
8.2. Software, no emphasis on security
-
Systems Administration
Distributed Systems
Database Management Systems
Engineering of Enterprise Software Systems
Foundations of Formal Methods and Software Analysis
Managing Software Development
8.3. Security
-
Network Security
Access Control Systems
Hardening the Operating System
Introduction to Computer Security
Secure Computer Systems
Secure Software Systems
Secure Transmission Systems
Wireless Systems Security
Applied Information Assurance
Cyber Terrorism
Fundamentals of Cybersecurity
Cyberspace and Cybersecurity
Cybersecurity Capstone Project
Enterprise Security and Information Assurance
Foundations of Information Assurance
Prevention and Protection Strategies in Cybersecurity
Privacy in a Networked World
Viral Activity and Malware - Examples:
-
Austin Peay, Network Security
- Stevens, CS-573 Fundamentals of Cybersecurity
8.4. Forensics
-
Computer Forensics
Network Forensics
Host-Based Forensics
Advanced Host-Based Forensic Analysis
Information System Forensics
Cyber Crime Investigation and Digital Forensics
Event Reconstruction and Correlation - Examples:
- PSU IST-454 Course Description
Guide to Computer Forensics and Investigations
Digital Evidence and Computer Crime
8.5. Intrusion
-
Network Traffic Analysis
Advanced Network Analysis
Intrusion Detection Systems
Firewalls, Proxies, and Bastion Hosts
Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing - Examples:
- Network Intrusion Detection
NIST Guide to Intrusion Detection and Prevention Systems (pdf)
8.6. Cryptography
-
Cryptography
Applied Cryptography
Cryptographic Protocols
Foundations of Cryptography
Discrete Mathematics for Cryptography
8.7. Legal
-
Law and Psychology
Psychological Profiling
Legal Issues for the IT Professional
Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology
Ethics, Privacy, and Digital Rights
White Collar Crime
Cyber Law and Research Methods
Terrorism and International Crime
8.8. Business
-
Compliance and Electronic Data
Risk Analysis and Economics of Security
Decision Making in Critical Infrastructure
Security Risk Management and Assessment
Strategic Security Management
9. Existing Courses at Villanova
- Networks, no emphasis on security
- ECE 7428 Computer Communication Networks
ECE 8408 Mobile Computing & Wireless Networks
ECE 8480 Introduction to Cloud Computing
ECE 8787 Communication Networks
CSC 8530 Distributed Systems
CSC 8560 Computer Networks
CSC 8580 Network Management & Performance - Software, no emphasis on security
- ECE 8247 Multimedia Systems
ECE 8471 Software Reliability
ECE 8473 Operating Systems and Programming
CSC 8400 Computer Systems
CSC 8410 Operating Systems Concepts
CSC 8411 Advanced Computer Systems
CSC 8490 Database Systems
CSC 8491 Data Mining & Database Programming
CSC 8700 System Programming - UNIX & C
CSC 8710 Advanced System Programming
CSC 8720 System Administration Concepts - Security & Cryptography
- ECE 8476 Computer Communications Security
MAT 7770 Number Theory - Legal
- LAW 6035 First Amendment in Cyberspace
LAW 6047 Intellectual Property in Cyberspace
LAW 7010 Intellectual Property in Cyberlaw
LAW 7063 Corporate & White Collar Crime
LAW 7094 Law and the Internet
LAW 7111 Telecommunications Law Policy
LAW 40100 Electronic Commerce - Forensics
Intrusion
Business
10. General Recommendations
- Need to create some new courses in areas of
- Security & Cryptography
- Forensics
- Intrusion
- Business
- Security & Cryptography
- Coordinate a Cybersecurity certificate or degree program with help from Math, Computer Science, Business, and the Law School
11. Specific Recommendations
Proposed courses, based on discussions with Dr. Singh, Bob Farrell, Ed Dougherty, and Scott Streit:- Cybersecurity Forensics
check with law school regarding expertise...
- Identification Systems (biometrics, etc.)
Examples:
SJSU Biometric Identification Science and Technology
UNR Seminar on Biometrics - Secure Communications & Storage
- Pattern Recognition for Cybersecurity
check with Bijan...
- Computer Systems Security Architecture
- Cryptography and Network Security
new name for ECE 8476 (formerly was Computer Communications Security)
- Introduction to Cloud Computing
ECE 8480, new this semester, Scott Streit
- Modeling and Visualization
check computer science department...
- Semantic Web
Scott Streit
Links and Notes: at fog.misty.com/perry/ under "Cyber Security Links"