IA Courses

Undergraduate Courses

  • CIT 251 Computer Security Overview (4)
    This course gives a broad overview of Information Assurance. The course has two parts: Lecture/discussion related to information security basics and a laboratory component in which students learn technology-related security. Course materials include topics such as types of attacks, hacker techniques, legal and privacy issues, security policy, information security best practices and so on. Students also learn security technologies related to three areas: operating systems, networks, and Web and E-commerce. The course has a strong laboratory component in which students experiment with various practical computer security tools.
  • CIT 352 Network and Internet Security (3)
    This course provides a practical approach to network security applications and standards. The focus is to provide an in-depth understanding of the current network security principles, features, protocols, and implementations. The course includes a detailed discussion on design and maintaining a computer network from the security point of view. The emphasis is on applications that are widely used on the Internet and for corporate network, and on standards, especially Internet standards that have been widely deployed.
  • CIT 354 Computer Forensics (3)
    The dramatic development of technology, particularly the Internet, has made people and businesses extensively use electronic format for communication and information storage. A large percent of all corporate and individual communication is now created electronically leaving only a small amount on paper. Computer forensics is the technique of computer investigation and analysis in the interest of determining potential legal evidence. In other words, it is finding the electronic fingerprints. The course introduces computer forensics - electronic data collection and analysis, from the point of providing assistance to law enforcement, military and government agencies with electronic evidence.
  • CIT 361 Practical Guide to Computer File Systems Forensics (4)
    With much of our personal information now being recorded digitally, the field of computer forensics has grown exponentially. This course will provide students with a strong foundation in the principles of computer forensics. Students will learn how the field has evolved over time and why digital investigations have become more pervasive. A keen understanding of file systems, including operating systems and registries, is vital to understanding the evidence that a suspect leaves behind, and therefore provides the core of this course. The ultimate objective is to use digital evidence to prove control, ownership and intent to successfully prosecute a case. Students will gain practical experience with professional digital imaging tools, like Helix, X-Ways and FTK, which are used to extract, filter and analyze digital evidence. The course will include forensic imaging techniques for both Windows Personal Computers and Apple Macintosh machines.
  • CIT 363 Computer Forensics, Cyberlaw and Evidence Admissibility (4)
    Every computer forensics examiner must understand the interactions of people with hardware and software. Additionally, knowledge of the law is imperative to the successful conviction of a criminal. This course will detail the legal aspects of computer forensics investigations and evidence admissibility. Students will gain and understanding of the legal documentation required for gaining access to a suspect’s information, like letters of preservations and warrants; also included will be evidence custody and chain of custody forms. Finally, students will experience the intricacies of investigative report writing. A series of case studies will be incorporated into the course to explore reasons why some computer forensics investigations have been highly successful and the pitfalls that caused others to fail.
  • CIT 365 Mobile Device Forensics (4)
    Computer forensics investigators no longer simply rely on traditional computers as sources of evidence. Incriminating evidence can be found on cellphones, smartphones, PDAs, cameras and even game systems. This course will introduce students to mobile forensic file systems. Students will learn methods of evidence extraction from mobile devices and how these devices should be handled and analyzed. Labs sessions will allow students with hands-on analysis of phones, flash memory and SIM cards. Students will also learn about recovering deleted SMS text messages, call logs. An introduction to CDMA and GSM networks will also be provided. This practical experience will be supplemented with exposure to the use of digital images and video in investigations. The course will teach students how to find photo metadata, identify whether images have been edited, reconstruct damaged image files and subsequently use these files as admissible evidence.
  • CS 331 Security in Computing/CS 631S
    Security in Computing investigates the perpetration of damages and theft using the computer, and strategies for protection. The focus is on software that harms or steals from others, and schemes and mechanisms that are used for defense. Topics include viruses; cryptography; network security; protection in operating systems; database security; and intellectual property issues.
  • CS 397Q Securing and Managing Networks and Information Systems (1)
    This course will expose students to both technical and business concepts necessary to support and defend the network infrastructure and the business information systems within an organization. Students who complete this course will be able to develop an understanding of security threats and vulnerabilities on different platforms, and will learn to respond to and recover from security incidents. The course will emphasize collaborative learning through discussions with instructors and peers, self-learning through readings and research, and experiential learning through lab assignments. The course curriculum is mapped to the Collegiate Cyber Defense Competition (CCDC) model (http://www.nationalccdc.org). Students will be encouraged to participate in such competitions.

Graduate Courses

  • IT 603 Overview of Information Security
    The Internet has become global over the last decade. It has also become an important component of the global economy. It is therefore very important that the transactions over the Internet be made safe and secure. Breach of security may result because of loopholes in computer systems, networks, software or social engineering. This course is a basic course which gives an overview of computer systems security and network security. Topics covered include operating system security (both Windows and Unix), network security, Web security, social engineering and legal and ethical issues.
  • IT 612 Web Server Setup, Configuration and Security Issues
    This course provides a thorough introduction to the architecture of a Web server. Students will be setting up a Web server, configure it and understand the security issues. Students will be doing hands-on work either in the department labs or they can setup their own personal Web server. Topics include: Functions of a Web server, planning a server, configuring for CGI, and servlets, log files, server maintenance. Security issues will be discussed with focus on encryption, Secure Socket Layer (SSL), firewalls, and secure online transactions.
  • IT 628 The Linux Environment and Security
  • IT 660 Network Security
    This course covers the most important issues and topics in the huge area of computer and network security. Topics include: Encryption Techniques, (DES, AES, Contemporary Symmetric Ciphers, Public Key Cryptography and RSA), Message authentication and Hash Functions, Digital Signatures and Authentication Protocols, IP security (IPsec), SNMP vulnerabilities, E-mail Security, Secure Socket Layer (SSL) and Transport Layer Security, Web Security, Intruders, Malicious Software and Firewalls.
  • IT 662 Web and Internet Security
    This course covers technologies for securing e-commerce Web applications against vicious hacker attacks in both business-to-client (B2C) and business-to-business (B2B) environments. Server-side topics include Web server security, Web service security, secure transactions, intrusion detection, access control, firewall management, log analysis, SSL, digital certificate generation, and defense against attacks like denial-of-service. Client-side topics include applet sandbox security model, digital certificate management, cookie management, and defense against attacks like virus and JavaScript-enabled spoofing. Data security topics include cryptography basics, nonrepudiation, dematerialized moneys, virtual purses, EDI and its security, and defense against various e-commerce frauds.
  • IT 664 Computer and Internet Forensics
    This course provides a general overview of the theory and application of information warfare and forensic computing. The background information on information warfare highlights the inherent problems in today's computing environment and indicated the necessity of forensics to complement computer security. The course focuses on information warfare arsenal and tactics, defensive strategies, and causalities; network surveillance tools for information warfare; fundamentals of computer forensics; computer forensics services and technologies; search and seizure; data recovery and identification and digital evidence collection, duplication, and preservation; computer image verification and authentication; reconstruction of past events; legal issues; and advanced topics in forensics.
  • IT 666/ IS 641 Information Security Management
    This course discusses information security from organizational and managerial perspectives. For an organization, information security is a continuous management process. Security technology alone cannot facilitate this process without security professionals being aware of the tradeoffs and various policy issues embedded in this process. This course will provide students with a background in managing information security in organizations. Topics include risk identification and assessment, security policy and planning, personnel and security, privacy, security auditing, and legal issues.
  • IS 648 Cyber and Professional Ethics
    The pervasiveness of computers, technology, and the Web have made it imperative that we be aware of and understand the ethical and legal implications of these forces on our personal and professional lives. Through readings, discussions and case studies, this course examines the ethical and legal issues involved in computing by investigating such questions as free speech, privacy, and intellectual property on the Internet, cyber-crimes, employer/employee issues, and professional codes of ethics.
  • CS 651 Secure Distributed System Development (3)
    Internet/Linux server security overview. Cryptography concepts and their Java API. IP Security. Java Security framework. Java API for data confidentiality and identity authentication. Trust chains through digital certificate chains. Developing distributed applications with distributed Kerberos third-party authentication. Secure server application communications through SSL, TLS, HTTPS and VPN. Developing secure e-commerce transaction system supporting the Secure Electronic Transaction (SET) protocol. Secure server infrastructure with firewalls and Intrusion Detection Systems (IDS).
  • CS 652 Secure Web Application Development (3)
  • CS 653 Cryptography and Computer Security (3)
    This course covers the most important issues and topics in the huge area of cryptography and computer security. Topics include: Mathematics of Cryptography, Traditional Symmetric-Key Ciphers, Modern Symmetric-Key Ciphers, DES, AES, Asymmetric-Key Cryptography. RSA, Rabin, ElGamal and Elliptic Curve Cryptosystems, Message Integrity and Message Authentication, Cryptographic Hash Functions, Digital Signature, Entity Authentication and Key Management.
  • CS 654 Security in Computer Networking (3)
    This course covers the most important issues and topics in the area if network security. A good balance between theory and practice is sought. It covers attacks and threats in computer networks, including network mapping, port scanning, sniffing. DoS, DDoS, reflection attacks, attacks in DNS and leveraging P2P deployments for attacks, operational security, including firewalls and intrusion-detection systems. It also takes a layered approach to network security covering topics that include: Security at the Application Layer: PGP and S/MIME, security at the Transport layer: SSL and TLS. Security at the Network Layer: IPSec. Students will use software tools to participate in an important simulated lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.
Other Courses with an IA component:
  • CIT 396B Advanced Information Technology for Accounting Applications
  • ACC 060B CPA Review - Auditing and Attestation
  • ACC 375 Accounting Information Systems
  • ACC 470 Accounting Research Project