Symmetric key and public key cryptography, hash functions, random numbers and cryptanalysis; authentication and authorization, password-based security, ACLs and capabilities, covert channels, security models, firewalls and intrusion detection systems; authentication protocols, session keys, SSH, SSL, IPSec, Kerberos, WEP, and GSM; flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development and operating systems security; fundamentals about bitcoin and cryptocurrency technologies. Students write programs for assignments using the C programming language.
Learning Objectives
Symmetric key and public key cryptography, hash functions, random numbers and cryptanalysis; authentication and authorization, password-based security, ACLs and capabilities, covert channels, security models, firewalls and intrusion detection systems; authentication protocols, session keys, SSH, SSL, IPSec, Kerberos, WEP, and GSM; flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development and operating systems security; fundamentals about bitcoin and cryptocurrency technologies. Students write programs for assignments using the C programming language.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cybersecurity Management
- Executive Cyber Leadership
- Program/Project Management and Acquisition
- Risk Management
- Strategic Planning and Policy