Courses

NOTE: If you are looking for information on security certificates, please go to the Certificates page.
This page has a list of some courses that may contain cybersecurity content, along with their mathematical and technical prerequisites. You can filter the list using the form below.

Prepares students with an understanding of virtual machines with universal principles that apply to all operating systems structure and operation including the concepts of processes, resource and file management and performance. Students also develop an understanding of the pervasive use of Unix based operating systems in the design of various systems such as switches, routers, Load balances, wireless controllers and network Management platforms to provide various services to support interaction between computer-based systems.

Introduction to the design and use of database systems. Topics include data models, database query languages, logical database design and dependency theory.

Advanced topics such as operating system design, job control languages, problems of multiprogramming and multiprocessing, computer networks, interaction, overlays, paging and accounting for resource usage (customer billing and hardware monitoring). System architecture. Interactive computers: time sharing, real-time and process control.

Effect of technology in modern society, with emphasis on the role of the engineering and technical professionals.

Logical and physical database system organization; logical models; design issues; secondary storage considerations

 Concepts in operating system analysis and design. General topics of process, resource and file management are presented and analyzed in the context of different system architectures and performance constraints. 

Undergraduate: Aims to introduce students to concepts of cryptography and its applications. Cryptography is the fundamental building block of any computer security solution. The knowledge gained from the course will enable students to apply these cryptographic algorithms in a better way to design security solutions.

Undergraduate: Electronic commerce technology, models and issues, with emphasis on security issues. Supporting technology such as cryptography, digital signatures, certificates and public key infrastructure (PKI). Security-conscious programming for web-based applications. Exposure to interaction between technical issues and business, legal and ethical issues.

Undergraduates: Security goals, threats and vulnerabilities. Cryptography, program security and operating system security issues. Basic network security. Planning, policies and risk analysis.

Graduates: Theory and practice of computer security, stressing security models and assurance. Security goals, threats and vulnerabilities. Cryptography, program security and operating system security issues. Basic network security. Planning, policies and risk analysis.

Introduction to data communications; asynchronous, synchronous, networks and current technology.

 

Pages