| Course: | SY110 |
| Title: | CYBER SECURITY I |
| Credits: | 2—2—3 |
| Description: | Introduction to Cyber Security is a hands-on lab-based course providing a technically focused introduction to the principles behind the use, function, and operation of computers, networks and applications with an emphasis on cyber security. [fall, spring] |
| Requisites: |
| Course: | SY201 |
| Title: | CYBER FUNDAMENTALS I |
| Credits: | 3—2—4 |
| Description: | This course will teach students problem solving skills in cyber-operations domain using the Python programming language on a Linux platform. Students will analyze the current cyber warfare threats and problems, and code Python programs to solve some of these and related problems. Credit will not be given for SY201 and SI268 or SA233. |
| Requisites: | Prereq: SY110 & SCY major. |
| Course: | SY202 |
| Title: | CYBER SYSTEMS ENGINEERING |
| Credits: | 2—2—3 |
| Description: | An introductory practicum that emphasizes interconnected cyber-physical systems, communications between those systems, the controls, and the associated space in which these relationships exist. Designed to provide students with an understanding of cyber systems engineering. Objectives: (1) Understand tools and techniques used in the design and analysis of cyber-controlled engineering systems; (2) Identify and discuss vulnerabilities of cyber-physical systems; (3) Apply linear modeling techniques to model simple control systems; (4) Synthesize a control system using microcontrollers, actuators, and sensors to meet a specific performance criteria; and (5) Understand operation of Industrial Control Systems and SCADA systems. |
| Requisites: | SY201, SM223, SP211 |
| Course: | SY204 |
| Title: | SYSTEMS PROGRAMMING & OS FUNDAMENTALS |
| Credits: | 3—2—4 |
| Description: | Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective. |
| Requisites: | Prereq: SY201 |
| Course: | SY205 |
| Title: | NETWORKING: OPS AND ANALYSIS |
| Credits: | 0—4—2 |
| Description: | In this course, students learn and practice information system networking through hands-on analysis. Students utilize various tools to capture and analyze network traffic. Students build wired networks, and set up and configure hardware and software. Students explore the OSI and TCP/IP stacks by analyzing protocols in operation, focusing on the Data Link Layer and up. Students are introduced to number systems, and command line interfaces. Credit will not be given for both SY205 and IC322. |
| Requisites: | Prereq: SY110. |
| Course: | SY206 |
| Title: | DATA STRUCTURES & DISCRETE MATH |
| Credits: | 3—2—4 |
| Description: | This course will cover Data Structures and Discrete Math, with a focus on cyber operations. Students will learn how complex data are represented in computer programs, the advantages/disadvantages of different data structures and how to analyze algorithms to determine their efficiency. They will also learn Discrete Math topics, including proof by induction, recurrence relations and graph theory, and how to apply them to data structure analysis. |
| Requisites: | Prereq: SY201 |
| Course: | SY301 |
| Title: | DATA STRUCTURES FOR CYBER OPERATIONS |
| Credits: | 3—2—4 |
| Description: | This course will cover the usual Data Structures topics, with a focus on cyber-operations. Students will learn how complex data are represented in computer programs and how the implementation/interface distinction helps enable it. They will learn the most common abstract data types and the standard implementations of them. They will explore how complexity in representation enables more sophisticated software, but also creates complex vulnerabilities. Examples will segue into the Web and Database course. |
| Requisites: | Prereq: SY204. |
| Course: | SY303 |
| Title: | CYBER SYSTEMS ARCHITECTURE |
| Credits: | 3—2—4 |
| Description: | A simple yet functional computer will be designed and implemented using NAND gates and D Flip-Flops. In this project-oriented course, groups will collaborate on each component of this modular system design. A hardware description language will be used to describe the sequential and combinational logic needed to implement each module. The models are integrated to a fully functional computer prepared to accept high-level object-oriented programs through the designs of an assembler and a virtual machine language translator. The course then introduces a real-world ARM assembly language and the students practice coding an embedded processor culminating with a security focused project. |
| Requisites: | SY205, SY206 |
| Course: | SY304 |
| Title: | HUMAN FACTORS IN CYBER OPERATIONS |
| Credits: | 3—0—3 |
| Description: | This course will examine the "human factor" of cyber operations, the role of individuals and groups as a factor in cyber operations, with a focus on the use of social engineering techniques and non-standard approaches used to gain an advantage (technologically, militarily, economically, intellectually) in the cyber domain. Social Engineering is the art of exploiting human psychology to gain access to buildings, systems, or data, and is evolving such that technology solutions, security policies, and operational procedures alone cannot protect resources. In many cases, individuals prove to be the largest vulnerability in a network, cyber practitioners need to understand how to effectively defend against or exploit such vulnerabilities. |
| Requisites: | Prereq: SCY major |
| Course: | SY305 |
| Title: | SYSTEMS PROGRAMMING W/ OS CONCEPTS |
| Credits: | 3—2—4 |
| Description: | Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective. |
| Requisites: | Prereq: SY202 or Dept Chair permission |
| Course: | SY306 |
| Title: | WEB AND DATABASES FOR CYBER OPERATIONS |
| Credits: | 2—2—3 |
| Description: | The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end. |
| Requisites: | Prereq: SY206 |
| Course: | SY310 |
| Title: | INTRO TO NETWORKING & WIRELESS COMMUNICATIONS |
| Credits: | 3—2—4 |
| Description: | An introduction to wired and wireless communications and associated vulnerabilities at the physical, data link and network layers of the TCP/IP model. The theme of this course is for the student to understand the entire communication cycle as it pertains to wired and wireless computer networks and communications systems. Beginning with electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment. The student will demonstrate applications of interdependent networks, including the Internet and telecommunications networks within the cyberspace domain. Additionally, the student will understand electronic engineering and tactics in support of spectrum dominance and retaining strategic advantage to open and closed networks. |
| Requisites: | Prereq: SY110, SM122. |
| Course: | SY312 |
| Title: | WIRELESS COMMS: PRINC & NETS |
| Credits: | 3—2—4 |
| Description: | Students will learn the entire communication cycle as it pertains to wireless communication systems. Beginning with the electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment to include current implementation of wireless networks and associated modern technologies. Throughout the course, students will explore and analyze the inherent cyber vulnerabilities of wireless communications and appropriate defensive security procedures for modern wireless networks. Credit will not be given for both SY312 and SY310. |
| Requisites: | Prereq: SY110, SY205 Coreq: SY308 |
| Course: | SY314 |
| Title: | WIRELESS COMMS: NETWORKS & TECH |
| Credits: | 2—2—3 |
| Description: | Students will learn the entire communication cycle as it pertains to wireless communication systems. Beginning with the electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment to include current implementation of wireless networks and associated modern technologies. Throughout the course, students will explore an analyze the inherent cyber vulnerabilities of wireless communications and appropriate defensive security procedures for modern wireless networks. (Cannot receive credit for both SY312 and SY314) |
| Requisites: | Prereqs: SY205, SM122. |
| Course: | SY401 |
| Title: | CYBER OPERATIONS I (OFFENSE) |
| Credits: | 2—2—3 |
| Description: | This is the first of two sequential courses focused on hands-on offensive (Fall Semester) cyber operations. Learning cyber defense techniques and operations creates stronger offensive cyber operators and vice versa. End-to-end Offensive Cyber Operations (OCO) are covered with a focus on specific tools, tactics, techniques, and procedures to attain an understanding of how to take advantage of adversary vulnerabilities to achieve objectives in and through Cyberspace. Primary topics on fundamental offensive techniques are explored through open source tools, and include information fathering, reconnaissance, social engineering, remote exploitation, and maintaining access. Capstone updates are required at 6/12/16 weeks as well. |
| Requisites: | Prereq: (SY310, SY312, or SY314), SY303, SY304, SY308. |
| Course: | SY402 |
| Title: | CYBER OPERATIONS II (DEFENSE) |
| Credits: | 2—2—3 |
| Description: | This is the second of two sequential courses focused on hands-on defensive (Spring Semester) cyber operations. This course introduces the technologies of our interconnected world and how they work together, and goes into detail on how to detect network and host intrusions and events. Students will build their own small network and will study methods for detecting events and processing the large amounts of associated data. Students will also complete their Capstone Project and be prepared to share their work on Capstone Day. |
| Requisites: | Prereq: SY401. |
| Course: | SY403 |
| Title: | CYBER PLANNING & POLICY |
| Credits: | 3—0—3 |
| Description: | A growing dependence on military and intelligence networks and the networking of our critical national infrastructure can quickly become vulnerabilities. This course will develop a political and economic framework for analyzing cyber power. The course will cover the body of thought that impinges on cyber matters and provides a synthesis of this information in a variety of decision-making contexts. |
| Requisites: | Prereq: FP130 |
| Course: | SY406 |
| Title: | CYBER LAW & ETHICS |
| Credits: | 3—0—3 |
| Description: | This course examines legal and ethical challenges that cyber operations professionals confront in the public and private sectors. The course begins with an in-depth review of the provisions of the United States Constitution that shape the cyber operations of the military and civilian government agencies. The course then reviews the statutes and regulations that provide the government with the authority to conduct cyber operations, as well as the limits that the statutes impose. The course examines the interplay between public-sector and private sector cybersecurity efforts, and the state and federal laws that regulate private-sector cybersecurity. We also explore the ethical considerations that apply to cyber operations. Counts for upper level Humanities and Social Science credit. |
| Requisites: | Prereq: NE203. |
| Course: | SY416 |
| Title: | SOFTWARE REVERSE ENGINEERING |
| Credits: | 2—2—3 |
| Description: | Students will learn why software is reverse engineered and the fundamentals of how it's done. Fundamental topics will be introduced: compilers, linkers, loaders, assembly language, as well as static and dynamic analysis tools. Hands on work will develop the skills and knowledge used to reverse engineer a binary. We begin by discussing computer architecture, the evolution of programming from assembly language to modern languages, as well as the fundamentals of compilation. We then apply this knowledge while learning about static and dynamic analysis tools used to reverse engineer software. Students will reverse engineer representative examples of software, including malware. |
| Requisites: | Prereq: SY303 or IC220 or EC362 |
| Course: | SY418 |
| Title: | MODERN DIGITAL FORENSICS |
| Credits: | 2—2—3 |
| Description: | A hands-on multidisciplinary course where students will learn and perform digital, mobile, and network forensics using modern hardware and software forensic tools, as well as be introduced to the legal aspects of forensics and how they are intertwined with technology. |
| Requisites: | Prereq: SY301, SY303, or permission of the Dept Chair. |
| Course: | SY419 |
| Title: | FREE SPEECH IN CYBERSPACE |
| Credits: | 3—0—3 |
| Description: | This course examines how free speech law has shaped cyberspace. We will look at constitutional and statutory protections on free speech in the United States, and examine the role that platforms play in enabling free speech. The topics covered include the First Amendment as applied to the Internet, intermediary liability protections such as Section 230, legal protections for online anonymity, and copyright protections for online content. |
| Requisites: | Prereq: FP130. |
| Course: | SY420 |
| Title: | GAME THEORY FOR CYBER SYSTEMS |
| Credits: | 3—0—3 |
| Description: | Students learn Classical Game Theory and its applications within cyber system scenarios. Students will learn about Zero-Sum, Non-Cooperative, and Cooperative game scenarios as well as how to calculate equilibrium solutions. Most common two player classical game theory games will be discussed with applications in cyber. Additionally, students will learn about Evolutionary Games and Machine Learning topics including Markov Decision Processes and solution via finite horizon dynamic programming using policy and value iteration algorithms. Students learn how to formalize game outcomes, payoff, and describe strategies. Computational methods are employed to demonstrate and execute strategies in a course specific online multiplayer arena. Applications include: congestion control for protocols, Robot planning, historic military applications, athletic performance, imitation and signaling games in cyber. SY420 and SE450 cannot both be taken for credit. |
| Requisites: | SY206 or course coordinator approval |
| Course: | SY421 |
| Title: | PENTESTING |
| Credits: | 2—2—3 |
| Description: | This course is focused on assessing the security of modern computing systems. Students will build a skillset to find flaws and vulnerabilities in a variety of domains and solve security challenges involving websites, cryptography, forensics, reverse engineering, and binary exploitation. |
| Requisites: | Prereq: SY308 |
| Course: | SY422 |
| Title: | QUANTUM COMPUTING |
| Credits: | 3—0—3 |
| Description: | This course introduces quantum computing, starting with the theory underlying qubits and quantum gates to implementing and analyzing quantum algorithms and the physical instantiation of quantum computers. Students will learn how quantum computation is fundamentally different from classical computation and how it can be leveraged to solve certain problems faster than is known possible on classical computers. |
| Requisites: |
| Course: | SY441 |
| Title: | ESPIONAGE IN THE CYBER AGE |
| Credits: | 3—0—3 |
| Description: | Espionage, as a practice, has changed dramatically over time and continues to evolve alongside social, political, and technological transformations. In this course, we examine and analyze the interdisciplinary topic of cyber espionage and explore the manifold ways that espionage and the cyber domain have affected each other. This is a reading-intensive course that includes a term paper. Through a variety of publications and scholarly journals, students will gain the background knowledge required to critically think, discuss, argue, and write on topics relating to espionage practices and cyber operations. |
| Requisites: | Prereq: 2/C standing or higher |
| Course: | SY442 |
| Title: | CYBERWAR |
| Credits: | 3—0—3 |
| Description: | This course prepares midshipmen to think about cybersecurity and cyberwar in a broad strategic context where there are inevitable trade-offs among competing goals and there are adversaries whose behavior may adapt to your actions. Material ranges from the potential of a large-scale campaign against a country, to issue of dominance, stability, deterrence, escalation, brandishing, signaling and norms. |
| Requisites: | Coreq: SY403 or SY406 |