| Course: |
SY110 CYBER SECURITY I
|
| Description: |
Introduction to Cyber Security is a hands-on lab-based course providing a technically focused introduction to the principles behind the use, function, and operation of computers, networks and applications with an emphasis on cyber security. |
| Credits: |
2-2-3 |
| Offered: |
Fall/Spring |
| Prerequisites: |
None |
| Coordinator: |
LCDR Bart Ellison |
| Course: |
SY201 CYBER FUNDAMENTALS I
|
| Description: |
This course will teach students problem solving skills in cyber-operations domain using the Python programming language on a Linux platform. Students will analyze the current cyber warfare threats and problems, and code Python programs to solve some of these and related problems. Credit will not be given for SY201 and SI268 or SA233. |
| Credits: |
3-2-4 |
| Offered: |
Fall |
| Prerequisites: |
None |
| Coordinator: |
Prof. April Edwards |
| Course: |
SY202 CYBER SYSTEMS ENGINEERING
|
| Description: |
An introductory practicum that emphasizes interconnected cyber-physical systems, communications between those systems, the controls and the associated space in which these relationships exist. The student will demonstrate that cyberspace is a domain within the information and electromagnetic environment consisting of the interdependent network of information technology infrastructure, including the Internet, telecommunications networks, computer systems, and embedded processors and control systems. The theme of this course is for the student to understand that entire communication cycle as it pertains to the cyber physical and communications controls systems. |
| Credits: |
2-2-3 |
| Offered: |
Spring |
| Prerequisites: |
SY201, SM223, SP211 |
| Coordinator: |
Erick J. Rodriguez-Seda |
| Course: |
SY205 NETWORKING: OPS AND ANALYSIS
|
| Description: |
In this course, students learn and practice information system networking through hands-on analysis. Students utilize various tools to capture and analyze network traffic. Students build wired networks, and set up and configure hardware and software. Students explore the OSI and TCP/IP stacks by analyzing protocols in operation, focusing on the Data Link Layer and up. Students are introduced to number systems, and command line interfaces. Credit will not be given for both SY205 and IC322.
|
| Credits: |
0-4-2 |
| Offered: |
Spring |
| Prerequisites: |
SY110 |
| Coordinator: |
CDR Ken St. Germain |
| Course: |
SY206 DATA STRUCTURES & DISCRETE MATH
|
| Description: |
This course will cover Data Structures and Discrete Math, with a focus on cyber operations. Students will learn how complex data are represented in computer programs, the advantages/disadvantages of different data structures and how to analyze algorithms to determine their efficiency. They will also learn Discrete Math topics, including proof by induction, recurrence relations and graph theory, and how to apply them to data structure analysis. |
| Credits: |
3-2-4 |
| Offered: |
Fall |
| Prerequisites: |
SY201 |
| Coordinator: |
Prof. Travis Mayberry |
| Course: |
SY303 CYBER SYSTEMS ARCHITECTURE
|
| Description: |
A simple yet functional computer will be designed and implemented using NAND gates and D Flip-Flops. In this project-oriented course, groups will collaborate on each component of this modular system design. A hardware description language will be used to describe the sequential and combinational logic needed to implement each module. The computer will then be prepared to execute high-level object-oriented programs through the designs of an assembler, a virtual machine, and a compiler. Finally, a basic operating system will be designed to allow easy interfacing with the underlying hardware. As time permits, a final project will address a security concern in the overall system or utilize the system to implement an existing security algorithm. |
| Credits: |
2-3-4 |
| Offered: |
Fall |
| Prerequisites: |
SY205, SY206 |
| Coordinator: |
CDR Brien Croteau |
| Course: |
SY304 HUMAN FACTORS IN CYBER OPERATIONS
|
| Description: |
This course will examine the "human factor" of cyber operations, the role of individuals and groups as a factor in cyber operations, with a focus on the use of social engineering techniques and non-standard approaches used to gain an advantage (technologically, militarily, economically, intellectually) in the cyber domain. Social Engineering is the art of exploiting human psychology to gain access to buildings, systems, or data, and is evolving such that technology solutions, security policies, and operational procedures alone cannot protect resources. In many cases, individuals prove to be the largest vulnerability in a network, cyber practitioners need to understand how to effectively defend against or exploit such vulnerabilities. |
| Credits: |
3-0-3 |
| Offered: |
Spring |
| Prerequisites: |
None |
| Coordinator: |
CDR Ike Stutts |
| Course: |
SY305 SYSTEMS PROGRAMMING W/ OS CONCEPTS
|
| Description: |
Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective. |
| Credits: |
3-2-4 |
| Offered: |
Spring |
| Prerequisites: |
IC210/SI204/SY201 |
| Coordinator: |
Prof. Avinash Srinivasan |
| Course: |
SY306 WEB AND DATABASES FOR CYBER OPERATIONS
|
| Description: |
The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end. |
| Credits: |
2-2-3 |
| Offered: |
Spring |
| Prerequisites: |
SY301 |
| Coordinator: |
Prof. April Edwards |
| Course: |
SY308 Info Security Fundamentals
|
| Description: |
This course covers foundational technical methods around security in software systems. Students will learn symmetric and asymmetric cryptographic tools to protect and understand confidentiality and integrity, alongside secure software design principles and foundational methods for binary exploitation.. |
| Credits: |
3-0-3 |
| Offered: |
Spring |
| Prerequisites: |
SY305, SM239 or equivalent |
| Coordinator: |
Prof. Ellis Fenske |
| Course: |
SY314 WIRELESS COMMS: NETWORKS & TECH
|
| Description: |
Students will learn the entire communication cycle as it pertains to wireless communication systems. Beginning with the electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment to include current implementation of wireless networks and associated modern technologies. Throughout the course, students will explore an analyze the inherent cyber vulnerabilities of wireless communications and appropriate defensive security procedures for modern wireless networks. (Cannot receive credit for both SY312 and SY314). |
| Credits: |
2-2-3 |
| Offered: |
Spring |
| Prerequisites: |
SY205, SM122 |
| Coordinator: |
CDR Ken St. Germain |
| Course: |
SY401 CYBER OPERATIONS I (OFFENSE)
|
| Description: |
This is the first of two sequential courses focused on hands-on offensive (Fall Semester) cyber operations. Learning cyber defense techniques and operations creates stronger offensive cyber operators and vice versa. End-to-end Offensive Cyber Operations (OCO) are covered with a focus on specific tools, tactics, techniques, and procedures to attain an understanding of how to take advantage of adversary vulnerabilities to achieve objectives in and through Cyberspace. Primary topics on fundamental offensive techniques are explored through open source tools, and include information fathering, reconnaissance, social engineering, remote exploitation, and maintaining access. Capstone updates are required at 6/12/16 weeks as well. |
| Credits: |
2-2-3 |
| Offered: |
Fall |
| Prerequisites: |
(SY310, SY312, or SY314), SY303, SY304, SY308 |
| Coordinator: |
Prof. John Doherty |
| Course: |
SY402 CYBER OPERATIONS II (DEFENSE)
|
| Description: |
This is the second of two sequential courses focused on hands-on defensive (Spring Semester) cyber operations. This course introduces the technologies of our interconnected world and how they work together, and goes into detail on how to detect network and host intrusions and events. Students will build their own small network and will study methods for detecting events and processing the large amounts of associated data. Students will also complete their Capstone Project and be prepared to share their work on Capstone Day. |
| Credits: |
2-2-3 |
| Offered: |
Fall |
| Prerequisites: |
SY401 |
| Coordinator: |
Dennis Dias |
| Course: |
SY403 CYBER PLANNING & POLICY
|
| Description: |
A growing dependence on military and intelligence networks and the networking of our critical national infrastructure can quickly become vulnerabilities. This course will develop a political and economic framework for analyzing cyber power. The course will cover the body of thought that impinges on cyber matters and provides a synthesis of this information in a variety of decision-making contexts. |
| Credits: |
3-0-3 |
| Offered: |
Fall |
| Prerequisites: |
FP130 |
| Coordinator: |
Prof. Joe Hatfield |
| Course: |
SY406 CYBER LAW & ETHICS
|
| Description: |
This course examines legal and ethical challenges that cyber operations professionals confront in the public and private sectors. The course begins with an in-depth review of the provisions of the United States Constitution that shape the cyber operations of the military and civilian government agencies. The course then reviews the statutes and regulations that provide the government with the authority to conduct cyber operations, as well as the limits that the statutes impose. The course examines the interplay between public-sector and private sector cybersecurity efforts, and the state and federal laws that regulate private-sector cybersecurity. We also explore the ethical considerations that apply to cyber operations. Counts for upper level Humanities and Social Science credit. |
| Credits: |
3-0-3 |
| Offered: |
Spring |
| Prerequisites: |
NE203 |
| Coordinator: |
Prof. Jeff Kosseff |
| Course: |
SY416 SOFTWARE REVERSE ENGINEERING
|
| Description: |
Students will learn why software is reverse engineered and the fundamentals of how it's done. Fundamental topics will be introduced: compilers, linkers, loaders, assembly language, as well as static and dynamic analysis tools. Hands on work will develop the skills and knowledge used to reverse engineer a binary. We begin by discussing computer architecture, the evolution of programming from assembly language to modern languages, as well as the fundamentals of compilation. We then apply this knowledge while learning about static and dynamic analysis tools used to reverse engineer software. Students will reverse engineer representative examples of software, including malware. |
| Credits: |
2-2-3 |
| Offered: |
Spring |
| Prerequisites: |
SY303 or IC220 or EC362 |
| Coordinator: |
Prof. Dane Brown |
| Course: |
IC411 OPERATING SYSTEMS
|
| Description: |
The study of the operating system as a resource manager. Topics include process management, interrupt processing, memory management, deadlock handling, file systems, multiprogramming, multiprocessing, data security and protection. |
| Credits: |
3-0-3 |
| Offered: |
Fall |
| Prerequisites: |
(IC220 or SY303), (IC221 or SY305), and (IC312 or SY301) |
| Coordinator: |
Matthew Sweeney |