CS/CYS 492 Computer Security (Spring 2024)

The fundamentals of computer and network security issues are explored. Topics include classical and modern techniques of conventional encryption; algorithms; public-key encryption, and hash functions; network security, with regard to e-mail, IP, and the Web; and system security intruders, viruses, worms, and firewalls.

Instructor:

Chad Williams

Term: Spring 2024


Credits: 3

Extended description:

Course learning outcomes
Program objectives and program learning outcomes are supported by the following course learning outcomes achieved by students upon a successful completion of this course students will have the ability to:

  • CLO-1: Apply the basics of how cryptography and cryptanalysis is done and implemented (SO-1, SO-2)
  • CLO-2: Evaluate the differences between symmetric and asymmetric cryptography and the benefits of each type (SO-1, SO-2)
  • CLO-3: Apply how authentication and authorization is performed and implemented (SO-1, SO-2)
  • CLO-4: Evaluate current security protocols and how security is implemented (SO-1, SO-2)
  • CLO-5: Apply continual learning in software security as related to end-user applications, operating systems, and network security (SO-1)
  • CLO-6: Use common tools to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software’s functionality (SO-1).
  • CLO-7: Synthesize effective communication (orally and written) of complex technical ideas and their relation to their professional and ethical responsibilities (SO-1, SO-4)