Registered for Spring 2026
———————————————————
Cyber Defense Fundamentals
This course introduces students to cyber security and defense. The course will primarily focus on cybersecurity theory, information protection and assurance, and computer systems and networks security. This course provides the essentials for understanding the security threats to information systems, the methods to counter these threats, and the state-of-the-art implementations and applications of cybersecurity systems.
- understand the basic security models, concepts, possible attacks, and cryptographic applications,
- learn basic mathematic knowledge and tools for building, analyzing, and attacking modern cryptographic systems,
- understand cryptographic algorithms for symmetrical encryption, public key encryption, hash function and digital signature,
- gain hands-on experience in implementing and applying cryptographic algorithms,
- understand security fundamental principles, and
- understand Internet security protocol and standards.
Cyber Physical System Security
Cyber Physical Systems (CPSs) integrate computing, networking, and physical processes. CPSs are known for their ability to: a) monitor the physical environment; b) use the monitored data in detecting the state of the physical environment; c) control the physical environment; and d) use cyber communications to perform its monitoring, detection and control operations. This course will introduce the state-of-the-art CPS technologies, ranging from Internet-of-Things to clouds. Course objectives include the following:
- learn the basic concepts, technologies and applications of Internet-of-Things (IoT),
- understand the fundamental security challenges and practical countermeasures and attacks in IoT systems,
- learn the basic architecture, technologies and applications of Industrial Internet-of-Things (IIoT) for critical infrastructures,
- understand the vulnerabilities of IIoT and the related critical national security impact,
- learn the basic concepts of cloud infrastructure and its service models and deployment modes,
- understand cloud deployment, management, and scaling techniques,
- understand vulnerabilities and threats and learn security and privacy policies and solutions in clouds, and
- gain hands-on experience with IoT and cloud systems.
Course Material
Placeholder 1
Include examples of your assignments and embedded versions of your material, pictures, audio explaining your work, a video, so on (Tutorials: Adding and Embedding Media, Plugin: Simple YouTube Embed, More).
Placeholder 2
Include examples of your assignments and embedded versions of your material, pictures, audio explaining your work, a video, so on (Tutorials: Adding and Embedding Media, Plugin: Simple YouTube Embed, More).