CS/CYS 492 Computer Security (Spring 2024)
The fundamentals of computer and network security issues are explored. Topics include classical and modern techniques of conventional encryption; algorithms; public-key encryption, and hash functions; network security, with regard to e-mail, IP, and the Web; and system security intruders, viruses, worms, and firewalls.
Instructor:
Chad Williams
Term: Spring 2024
Credits: 3
Extended description:
Course learning outcomes
Program objectives and program learning outcomes are supported by the following course learning outcomes achieved by students upon a successful completion of this course students will have the ability to:
- CLO-1: Apply the basics of how cryptography and cryptanalysis is done and implemented (SO-1, SO-2)
- CLO-2: Evaluate the differences between symmetric and asymmetric cryptography and the benefits of each type (SO-1, SO-2)
- CLO-3: Apply how authentication and authorization is performed and implemented (SO-1, SO-2)
- CLO-4: Evaluate current security protocols and how security is implemented (SO-1, SO-2)
- CLO-5: Apply continual learning in software security as related to end-user applications, operating systems, and network security (SO-1)
- CLO-6: Use common tools to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software’s functionality (SO-1).
- CLO-7: Synthesize effective communication (orally and written) of complex technical ideas and their relation to their professional and ethical responsibilities (SO-1, SO-4)