ICS 555: Crytography and Data Security
(3-0-3)
Mathematical principles of cryptography and data security. A detailed study of conventional and modern cryptosystems. Zero knowledge protocols. Information theory, Number theory, complexity theory concepts and their applications to cryptography. Note: Prerequisite is Consent of Instructor.
|
ICS 570: Computer Communication Networks
(3-0-3)
Examination of modern computer networking and data communications. Contemporary concepts, facilities, practices, implementations, and issues. Data Link and media access layer protocols. Introduction to Gigabit Ethernet, ATM and Frame Relay. Protocols of TCP/IP suite. IP routing, flow and congestion control. Application Layer. Introduction to modeling and analysis of data networks: Queueing theory, Little's Law, Single Queues, and Jackson Networks. Note: This course is equivalent to COE 540 or EE 674. Prerequisite is ICS 343 or equivalent. Prerequisites: ICS 343: Fundamentals of Computer Networks
|
ICS 571: Client Server Programming
(3-0-3)
Introduction to Clients, Servers, and Protocols. Client-Server Architectures. Software Architectures for Clients and Servers. Network and Operating System Support for Client-Server Applications. Programming language support. Standard interfaces and API. Examples of clients and servers for several popular protocols such as X, POP3, news, ftp, and http. Project(s). Note: Prerequisite is (ICS 570 and ICS 431) or Consent of Instructor. Prerequisites: ICS 431: Operating SystemsICS 570: Computer Communication Networks
|
ICS 572: Distributed Computing
(3-0-3)
Introduction to parallel and distributed computation models. Mapping a parallel solution to a distributed computing platform. Programming issues. Operating system support for distributed computing. Message passing environments such as PVM and MPI. Load balancing. Migration. Agent architectures. Performance and complexity measures. Services. Service driven design of distributed applications. Timing and Synchronization. Remote procedure invocation. Project(s). Note: Prerequisite is (ICS 570 and ICS 431) or Consent of Instructor. Prerequisites: ICS 431: Operating SystemsICS 570: Computer Communication Networks
|
ICS 573: High Performance Computing
(3-0-3)
Theory and practice of parallel computing. Analytical models of parallelism and performance evaluation. Parallel architectures. Software tools for parallel programming. Design and implementation methodologies for parallel high performance applications. Design, analysis, and implementation of parallel solutions for various scientific problems such as linear algebraic problems, fast Fourier transform, Monte Carlo techniques, boundary value problems, finite element techniques, and iterative systems. Project(s). Note: Prerequisite is (ICS 353 or Equivalent) or Consent of Instructor. Prerequisites: ICS 353: Design and Analysis of Algorithms
|
ICS 575: Application Development for Internet Based Services
(3-0-3)
Application Development for Deployment over the WWW. Application protocols. Connection and Session Objects. Authentication Services. Integrating Database Services. Component Architectures. Scripting Languages. Modern applications and application architectures such as Digital Cash and E-Commerce. Making use of the state-of-art tools, a major project will be developed by the students. Prerequisites: ICS 571: Client Server Programming
|
ICS 576: Concurrent and Parallel Processing
(3-0-3)
Concepts and foundation of parallel processing. Computational models. Parallel algorithms. parallelization techniques. Parallel software characteristics and requirements: languages, compilers, operating systems, and inter-process communication support. Parallel computer architectures. Case studies. Project(s). Note: Prerequisite is ICS 431 or equivalent. Prerequisites: ICS 431: Operating Systems
|
COE 541: Local and Metropolitan Area Networks
(3-0-3)
Protocols and Network Architectures. Various Technologies for Local and Metropolitan Area Networks (LANs and MANs). Classes of LANs and MANs. LAN and MAN design issues and Standards. LAN and MAN performance modeling and analysis. Internetworking. Examples of LANs and MANs. Case studies. Emerging LAN/MAN technologies. Note: Prerequisite is COE 540 or Consent of Instructor. Prerequisites: COE 540: Computer Networks
|
COE 542: High-Speed Networks
(3-0-3)
Protocols and Network Architecture. Local high speed networks. Broadband Metropolitan and Wide Area Networks. Impact of high speed on communication protocols and networks. Fiber optic networks. Design and performance issues of high speed networks. Standard high speed protocols and networks. Examples of high speed networks. Case studies. Emerging technologies for high speed networks. Note: Prerequisite is COE 540 or Consent of Instructor. Prerequisites: COE 540: Computer Networks
|
COE 543: Mobile Computing and Wireless Networks
(3-0-3)
Introduction to mobile computing and wireless networks. Designing computer networks to support computer mobility. Wireless network architecture and ad-hoc networks. Mobility standards, e.g. mobile IP. Mobility systems issues (e.g. performance &bandwidth). Quality of Service guarantees, reliability, and security in mobile computing environment. Access protocols for wireless networks. Note: Prerequisite is COE 540 or Consent of Instructor. Prerequisites: COE 540: Computer Networks
|
CNW 550: Computer Network Design
(3-0-3)
Types of computer networks: LANs, VLANs, and WANs. Routing algorithms and routing protocols. The network development life cycle. Network analysis and design methodology. Network design issues: Manageability; Node placement and sizing; Link topology and sizing; Routing; Reliability. Data in support of network design. Structured enterprise network design. Hierarchical tree network design: Terminal assignment; Concentrator location. Mesh topology optimization. Traffic flow analysis. Analysis of loss and delay in networks. Network reliability issues. Note: Prerequisite is (COE 540 and (ICS 353 or equivalent)) or Consent of Instructor. Prerequisites: COE 540: Computer NetworksICS 353: Design and Analysis of Algorithms
|
CNW 554: Modeling and Analysis of Computer Networks
(3-0-3)
Modeling. General concepts. Performance measures. Performance evaluation techniques. Model Validation. Introduction to Queuing Networks and StochasticProcesses. Simulation. The modeling cycle. Queuing network modeling. Flow analysis. Bottleneck analysis. Hierarchical modeling. Introduction to Analysis driven Design. Case studies with applications to different aspects of computer network systems. Note: Prerequisite is COE 540 or Consent of Instructor. Prerequisites: COE 540: Computer Networks
|
CNW 555: Protocol Engineering
(3-0-3)
Protocols and languages. Protocol structure. Structured protocol design. Fundamentals of Protocol Engineering. Specification and modeling. State Machines and Reachability Analysis. Formulation of desirable properties of protocols. Formal Logic and Deduction. Verification techniques. Formal description languages. Protocol synthesis. Protocol Design. Validation and conformance testing. Computer aided design tools for protocol engineering (simulation and validation tools). A major project involving comprehensive design and verification of a non-trivial protocol. Note: Prerequisite is (COE 540 and (ICS 253 or Equivalent)) or Consent of Instructor. Prerequisites: ICS 253: Discrete Structures ICOE 540: Computer Networks
|
SEC 511: Principles of Information Assurance and Security
(3-0-3)
Introduction to security and information assurance. Information confidentiality, availability, protection, and integrity. Security systems lifecycle. Risks, attacks, and the need for security. Legal, ethical, and professional issues in information security. Risk management including identification and assessment. Security technologies and tools. Security laws, audit and control. Cryptography foundations, algorithms and applications. Physical security, security and personnel, security implementation and management. Securing critical infrastructure. Trust and security in collaborative environments. Eligibility Requirements: Graduate Standing
|
SEC 521: Network Security
(3-0-3)
Network infrastructure security issues, including perimeter security defences, firewalls, virtual private networks, intrusion detection systems, wireless security, and network security auditing tools. Secure network applications. Network security protocols such as SSL, SSL/TLS, SSH, Kerberos, IPSec, IKE. Network threats and countermeasures. Network auditing and scanning. VoIP Security. Remote exploitation and penetration techniques. Network support for securing critical infrastructure. Design and development of software-based network security modules and tools based on hands-on experiences and state-of-the-art technologies. Note: SEC 521 cannot be taken for credit with CSE 551. Prerequisites: ICS 555: Crytography and Data Security
|
SEC 524: Computer and Network Forensics
(3-0-3)
Methodical approaches for collecting and preserving evidence of computer crimes, laws/regulation, and industry standards. Hands-on experience on identifying, analyzing, recreating, and addressing cyber based crimes. Ethical issues associated with information systems security. Foundational concepts such as file system structures, MAC times, and network protocols. Use of tools for evidence recovery. Use of established forensic methods in the handling of electronic evidence. Rigorous audit/logging and date archival practices. Prevention, detection, apprehension, and prosecution of security violators and cyber criminals, and general legal issues. Prerequisites: SEC 521: Network Security
|
SEC 528: Security in Wireless Networks
(3-0-3)
Security of wireless networks such as cellular networks, wireless LANs, mobile ad hoc networks, wireless mesh networks, and sensor networks. Overview of wireless networks. Study of threats and types of attacks, including attacks on MAC protocols. Selfish and malicious behavior in wireless routing protocols. Countermeasures/solutions and their limitations. Encryption and authentication. Secure hand-off techniques. Energy-aware security mechanisms. Secure multicasting. Key pre-distribution and management in wireless networks. Prerequisites: SEC 521: Network Security
|
SEC 531: Secure Software
(3-0-3)
Software security development lifecycle including security requirements analysis, design, coding, review, and testing. Construction of secure and safe C/Unix programs. Vulnerabilities in C source code. Stack and heap buffer overflows. Overview of secure web application development with consideration for SQL injection, cookies, and forceful browsing. Techniques for software protection, such as code obfuscation, tamper-proofing, and water-marking. Analysis of software based attacks and defenses, timing attacks and leakage of information. Type safety and capability systems. Numerous hands-on exercises and projects on writing secure code and unbreakable code and other related topics. Note: Equivalent to SWE 531. Eligibility Requirements: Graduate Standing
|
SEC 534: Database Security
(3-0-3)
Study of database security and auditing issues, challenges and protection methods. A review of relational and object database concepts. Database security and auditing issues. Authentication methods. Authorization based on privileges, roles, profiles, and resource limitations, and role-based authorization constraints. A study of access control mechanisms for current DBMSs, content-based and fine-grained access control, access control systems for object-based design and XML. Data confidentiality and privacy for databases. Secure statistical databases. Integrating databases and applications security. Database security protection via inference detection. Security implementation and administration, with applications to ecommerce, and emerging research in database security. Prerequisites: SEC 511: Principles of Information Assurance and Security
|
SEC 536: Web Application Security
(3-0-3)
Web applications security requirements, threats and countermeasures. Contemporary web application vulnerabilities and exploitation techniques, based on the Open Web Application Security Project (OWASP). Web defacement and server penetration techniques. Content-based attacks and effective countermeasures. Intellectual property protection and watermarking. Auditing and scanning Web applications and infrastructure for security weaknesses. Analysis of Web applications for key vulnerabilities and attacks. Security mechanisms and protocols and their roles in securing Web applications. Secure Web programming mechanisms in ASP.NET, Java, PHP, XML and SQL. Secure Web applications for e-commerce, e-banking and e-government transactions. Numerous hands-on exercises and projects on using tools and writing secure Web applications. Prerequisites: SEC 511: Principles of Information Assurance and Security
|
SEC 538: Trusted Computing
(3-0-3)
A comprehensive overview of trusted computing technology and its applications, TPM chips, secure boot, attestation, DRM, sealed storage, nature of trust, methods for characterizing, establishing, and attesting trust of a system. Trusted Virtualization. Operating system and hardware support for TC. Key management. Code signing. Identity management. Implications of certification. Trusted Mobile Platforms. Trust negotiation, transitive trust, trust evaluation and reputation systems. Trust computing architectures and modeling. Trust computing in P2P and cloud computing paradigms. Design and development of software applications and components to utilize trust computing for protecting information providers and end users. Prerequisites: ICS 555: Crytography and Data SecuritySEC 511: Principles of Information Assurance and Security
|
SEC 544: Biometric Systems
(3-0-3)
Theory of signal processing, especially image and sound processing, for purposes of biometric system design. An introduction to basic methods and techniques for the study of authentication based on static biometric features such as fingerprints, hand geometry, facial features, thermograms, iris and retina, voice, and handwriting. Study of recognition based on dynamic features including lip movements, typing, and gait, study of standards and applications of biometry. Eligibility Requirements: Graduate Standing
|
SEC 546: Embedded Systems Security
(3-0-3)
Study of various security models and techniques for embedded systems both from a hardware as well as a software perspective. Smart card security. RFID attack models (including power analysis, side channel, and timing attacks), and security techniques. Security in wireless sensor networks (key management techniques, attack models, detection and prevention techniques). eHealth (embedded medical systems) security. Cryptographic hardware. Industrial control systems (SCADA). Physical hardware. Security for System-on-chip, and Internet-devices such as Internet thermostats and automated doors. Eligibility Requirements: Graduate Standing
|
SEC 548: Watermarking and Steganography
(3-0-3)
Study of enabling technologies for digital watermarking and steganography including the history of information hiding, basic principles and techniques such as still images, video, and 3-D video objects, and their applicability to owner authentication, content authentication, information embedding and communication with side information. Evaluation and benchmarking of watermarking and steganography mechanisms. Study of malicious attacks inclusive of bit rate limitation, counterfeiting marks and removal attacks. Overview of attempts to formalize watermarking. Steganography vs. watermarking. Applications of steganography. software for steganography, and steganalysis techniques. Eligibility Requirements: Graduate Standing
|
SEC 595: Special Topics in Information Assurance and Security
(3-0-3)
Advanced topics selected from current journals of Information Assurance & Security and that deal with theoretical development or applications in the field. Eligibility Requirements: Graduate Standing
|
ICS 654: Advanced Topics in Computer Networking
(3-0-3)
This course explores recent research trends and developments in computer networks and their applications covering state-of-the-art topics and case studies. Note: Prerequisite is ICS 570 or equivalent. Prerequisites: ICS 570: Computer Communication Networks
|
Compliance Details javascript:commonShowModalDialog('{SiteUrl}/_layouts/itemexpiration.aspx?ID={ItemId}&List={ListId}', 'center:1;dialogHeight:500px;dialogWidth:500px;resizable:yes;status:no;location:no;menubar:no;help:no', function GotoPageAfterClose(pageid){if(pageid == 'hold') {STSNavigate(unescape(decodeURI('{SiteUrl}'))+'/_layouts/hold.aspx?ID={ItemId}&List={ListId}'); return false;} if(pageid == 'audit') {STSNavigate(unescape(decodeURI('{SiteUrl}'))+'/_layouts/Reporting.aspx?Category=Auditing&backtype=item&ID={ItemId}&List={ListId}'); return false;} if(pageid == 'config') {STSNavigate(unescape(decodeURI('{SiteUrl}'))+'/_layouts/expirationconfig.aspx?ID={ItemId}&List={ListId}'); return false;}}, null); return false; 0x0 0x1 ContentType 0x01 898 |