Cybersecurity Masters Degree Courses

R. Perry, Fall 2010


Table of Contents


1. Cybersecurity Engineering Notes

Notes from Bob Farrell

Other links and notes: at fog.misty.com/perry/ under "Cyber Security Links"


2. Cybersecurity Program Names

Cybersecurity
Information Security
Information Assurance
Information Systems Engineering
Computer and Network Security
Computer Security and Forensics
Information Security Management
Strategic Technical Management
Management of Information Systems
...

3. Carnegie Mellon Courses

Master of Science in Information Security Technology and Management

Computer Networks
Fundamentals of Telecommunications and Computer Networks
Packet Switching and Computer Networks

Introduction to Computer Security
Network Security
Applied Cryptography
Secure Software Systems

Host-Based Forensics
Advanced Host-Based Forensic Analysis
Network Forensics
Advanced Network Analysis
Applied Information Assurance
Event Reconstruction and Correlation


4. University of Maryland University College Courses

Master of Science in Cybersecurity

Cyberspace and Cybersecurity
Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology
Prevention and Protection Strategies in Cybersecurity
Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing
Cyber Crime Investigation and Digital Forensics
Cybersecurity Capstone

5. Stevens Institute of Technology Courses

Master of Science in Cybersecurity

Systems Administration
TCP/IP Networks
Mobile and Pervasive Computing
Network Management
Distributed Systems
Database Management Systems
Engineering of Enterprise Software Systems

Discrete Mathematics for Cryptography
Foundations of Cryptography
Cryptographic Protocols
Fundamentals of Cybersecurity
Privacy in a Networked World
Secure Computer Systems
Wireless Systems Security
Network Forensics

Legal Issues for the IT Professional
Risk Analysis and Economics of Security
Enterprise Security and Information Assurance


6. Virginia College Courses

Cybersecurity Master of Science


Math for Security Professionals
Cryptography
Viral Activity and Malware
Hardening the Operating System
Access Control Systems
Firewalls, Proxies, and Bastion Hosts
Intrusion Detection Systems
Computer Forensics
Network Traffic Analysis
Secure Transmission Systems

Compliance and Electronic Data
Psychological Profiling
Cyber Terrorism
Cyber Law and Research Methods


7. Northeastern University Courses

Master of Science in Information Assurance

Computer Systems
Fundamentals of Computer Networking
Wireless Networks

Managing Software Development
Database Management Systems
Foundations of Formal Methods and Software Analysis

Applied Cryptography
Foundations of Information Assurance
Computer System Security
Network Security Practices
Information System Forensics
Capstone Project

Law and Psychology
White Collar Crime
Terrorism and International Crime
Strategic Security Management
Security Risk Management and Assessment
Ethics, Privacy, and Digital Rights
Decision Making in Critical Infrastructure


8. Cybersecurity Course Areas

Networks, no emphasis on security

Software, no emphasis on security

Security

Forensics

Intrusion

Cryptography

Legal

Business

8.1. Networks, no emphasis on security

Computer Systems
Computer Networks
Fundamentals of Computer Networking
Fundamentals of Telecommunications and Computer Networks
Mobile and Pervasive Computing
Network Management
Packet Switching and Computer Networks
TCP/IP Networks
Wireless Networks

8.2. Software, no emphasis on security

Systems Administration
Distributed Systems
Database Management Systems
Engineering of Enterprise Software Systems
Foundations of Formal Methods and Software Analysis
Managing Software Development

8.3. Security

Network Security
Access Control Systems
Hardening the Operating System
Introduction to Computer Security
Secure Computer Systems
Secure Software Systems
Secure Transmission Systems
Wireless Systems Security
Applied Information Assurance
Cyber Terrorism
Fundamentals of Cybersecurity
Cyberspace and Cybersecurity
Cybersecurity Capstone Project
Enterprise Security and Information Assurance
Foundations of Information Assurance
Prevention and Protection Strategies in Cybersecurity
Privacy in a Networked World
Viral Activity and Malware

Examples:

Austin Peay, Network Security

Stevens, CS-573 Fundamentals of Cybersecurity

8.4. Forensics

Computer Forensics
Network Forensics
Host-Based Forensics
Advanced Host-Based Forensic Analysis
Information System Forensics
Cyber Crime Investigation and Digital Forensics
Event Reconstruction and Correlation

Examples:

PSU IST-454 Course Description
Guide to Computer Forensics and Investigations
Digital Evidence and Computer Crime

8.5. Intrusion

Network Traffic Analysis
Advanced Network Analysis
Intrusion Detection Systems
Firewalls, Proxies, and Bastion Hosts
Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing

Examples:

Network Intrusion Detection

NIST Guide to Intrusion Detection and Prevention Systems (pdf)

8.6. Cryptography

Cryptography
Applied Cryptography
Cryptographic Protocols
Foundations of Cryptography
Discrete Mathematics for Cryptography

8.7. Legal

Law and Psychology
Psychological Profiling
Legal Issues for the IT Professional
Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology
Ethics, Privacy, and Digital Rights
White Collar Crime
Cyber Law and Research Methods
Terrorism and International Crime

8.8. Business

Compliance and Electronic Data
Risk Analysis and Economics of Security
Decision Making in Critical Infrastructure
Security Risk Management and Assessment
Strategic Security Management

9. Existing Courses at Villanova

Networks, no emphasis on security

ECE 7428 Computer Communication Networks
ECE 8408 Mobile Computing & Wireless Networks
ECE 8480 Introduction to Cloud Computing
ECE 8787 Communication Networks
CSC 8530 Distributed Systems
CSC 8560 Computer Networks
CSC 8580 Network Management & Performance

Software, no emphasis on security

ECE 8247 Multimedia Systems
ECE 8471 Software Reliability
ECE 8473 Operating Systems and Programming
CSC 8400 Computer Systems
CSC 8410 Operating Systems Concepts
CSC 8411 Advanced Computer Systems
CSC 8490 Database Systems
CSC 8491 Data Mining & Database Programming
CSC 8700 System Programming - UNIX & C
CSC 8710 Advanced System Programming
CSC 8720 System Administration Concepts

Security & Cryptography

ECE 8476 Computer Communications Security
MAT 7770 Number Theory

Legal

LAW 6035 First Amendment in Cyberspace
LAW 6047 Intellectual Property in Cyberspace
LAW 7010 Intellectual Property in Cyberlaw
LAW 7063 Corporate & White Collar Crime
LAW 7094 Law and the Internet
LAW 7111 Telecommunications Law Policy
LAW 40100 Electronic Commerce

Forensics

Intrusion

Business


10. General Recommendations


11. Specific Recommendations

Proposed courses, based on discussions with Dr. Singh, Bob Farrell, Ed Dougherty, and Scott Streit:
  1. Cybersecurity Forensics

    check with law school regarding expertise...

  2. Identification Systems (biometrics, etc.)

    Examples:

    SJSU Biometric Identification Science and Technology
    UNR Seminar on Biometrics

  3. Secure Communications & Storage

  4. Pattern Recognition for Cybersecurity

    check with Bijan...

  5. Computer Systems Security Architecture

  6. Cryptography and Network Security

    new name for ECE 8476 (formerly was Computer Communications Security)

  7. Introduction to Cloud Computing

    ECE 8480, new this semester, Scott Streit

  8. Modeling and Visualization

    check computer science department...

  9. Semantic Web

    Scott Streit

 

Links and Notes: at fog.misty.com/perry/ under "Cyber Security Links"