Cybersecurity Course Schedule summer 2023

Cybersecurity courses are restricted to students enrolled in the MICS degree program only.

All times are listed in the Pacific Time Zone (America/Los_Angeles).

Graduate

This course explores the most important elements beyond technology that shape the playing field on which cybersecurity problems emerge and are managed. The course emphasizes how ethical, legal, and economic frameworks enable and constrain security technologies and policies. It introduces some of the most important macro-elements (such as national security considerations and interests of nation-states) and micro-elements (such as behavioral economic insights into how people understand and interact with security features). Specific topics include policymaking, business models, legal frameworks, national security considerations, ethical issues, standards making, and the roles of users, government, and industry.

Section 1
Tu 4:00 pm - 5:30 pm
Instructor(s): Kim Jones
Section 2
We 4:00 pm - 5:30 pm
Instructor(s): Amit Elazari

This course focuses on both mathematical and practical foundations of cryptography. The course discusses asymmetric and symmetric cryptography, Kerckhoffs’ Principle, chosen and known plaintext attacks, public key infrastructure, X.509, SSL/TLS (https), and authentication protocols. The course will include an in-depth discussion of many different cryptosystems including the RSA, Rabin, DES, AES, Elliptic Curve, and SHA family cryptosystems. This course also introduces advanced topics of applied cryptography, including a brief introduction to homomorphic encrypted computation and secure multi-party computation to protect sensitive data during arbitrary computation, cryptocurrency and its cryptographic building blocks, and quantum computing.

Section 1
Tu 6:30 pm - 8:00 pm
Instructor(s): Nahid Farhady Ghalaty
Section 2
Th 4:00 pm - 5:30 pm
Instructor(s): Aaron Crouch
Section 3
Th 6:30 pm - 8:00 pm
Instructor(s): Matthew Holmes

The course presents the challenges, principles, mechanisms and tools to make software secure. We will discuss the main causes of vulnerabilities and the means to avoid and defend against them. The focus is on secure programming practice, including specifics for various languages, but also covering system-level defenses (architectural approaches and run-time enforcement). We will also apply software analysis and vulnerability detection tools in different scenarios.

Section 1
We 4:00 pm - 5:30 pm
Instructor(s): Jennia Hizver
Section 2
We 6:30 pm - 8:00 pm
Instructor(s): Jennia Hizver

This course is designed to provide students with the foundational math and programming skills required to be successful in the Master of Information and Cybersecurity (MICS) program. Upon completion of this course, students will be able to write programs in Python and will gain experience reading and interpreting C programs. Students will receive a comprehensive overview of algebraic principles and will explore quantitative concepts needed for cryptography. Additionally, this course will prepare students to apply logical thinking and decompose complex problems to create programmatic solutions.

Section 1
Mo 4:00 pm - 5:30 pm
Instructor(s): Rosalind McCullough
Section 2
Mo 6:30 pm - 8:00 pm
Instructor(s): Serena Villalobos

Machine learning is a rapidly growing field at the intersection of computer science and statistics concerned with finding patterns in data. It is responsible for tremendous advances in technology, from personalized product recommendations to speech recognition in cell phones. This course provides a broad introduction to the key ideas in machine learning, with a focus on applications and concepts relevant to cybersecurity. The emphasis will be on intuition and practical examples rather than theoretical results, though some experience with probability, statistics, and linear algebra will be important.

Section 1
Th 4:00 pm - 5:30 pm
Instructor(s): Ishaani Priyadarshini

Introduction to networking and security as applied to networks. Exercises cover network programming in a language of the student's choice, understanding and analyzing packet traces using tools like wireshark and mitmproxy, as well as applying security principles to analyze and determine network security. After this course, the student will have a fundamental understanding of networking, TLS and security as it applies to networked systems.

Section 1
Mo 6:30 pm - 8:00 pm
Instructor(s): Richard Cziva
Section 2
Tu 6:30 pm - 8:00 pm
Instructor(s): Djavan Norris

This survey of operating system security compares approaches to security taken among several modern operating systems. The course will teach how to conceptualize design issues, principles, and good practices in securing systems in today’s increasingly diverse and complex computing ecosystem, which extends from things and personal devices to enterprises, with processing increasingly in the cloud. We will approach operating systems individually and then build on them so that students learn techniques for establishing trust across a set of interoperating systems.

Section 1
We 4:00 pm - 5:30 pm
Instructor(s): Matthew Garrett

Security and privacy systems can be made more usable by designing them with the user in mind, from the ground up. In this course, you will learn many of the common pitfalls of designing usable privacy and security systems, techniques for designing more usable systems, and how to evaluate privacy and security systems for usability. Through this course, you will learn methods for designing software systems that are more secure because they minimize the potential for human error.

Section 1
Th 6:30 pm - 8:00 pm

This course offers valuable perspective for both the non-technical business manager and the technical cybersecurity or IT manager. It is the vital connector between the technical world of threats, vulnerabilities, and exploits, and the business world of board-level objectives, enterprise risk management, and organizational leadership. Now more than ever, managers have a need and responsibility to understand cyber risk. Just as financial risks and other operational risks have to be effectively managed within an organization, cyber risk has to be managed. It spans far beyond information technology, with broad implications in the areas of organizational behavior, financial risk modeling, legal issues, and executive leadership.

Section 1
Mo 4:00 pm - 5:30 pm

Cybersecurity is a primary national security and public policy concern. The government, military and private sector have various roles and responsibilities with regard to the protection of the cyber domain. In this course, students critically evaluate these roles and responsibilities, the manner in which government networks, systems, and data are secured, and the ability of national and international cybersecurity strategies and partnerships to mitigate the security risks introduced by society’s increased reliance on information.

Section 1
Tu 4:00 pm - 5:30 pm
Instructor(s): Jason Kichen
Instructor is Jason Kichen.
Instructor is Jason Kichen.

This course will focus on understanding key areas within security operations from a management perspective. Upon completion of this course, students will understand implementation and maintenance best practices for security operations services such as incident response, internal investigations, security analysis, threat intelligence and digital forensics. Students will not only get hands-on experience within each discipline but will also understand how to recruit and train others within a security operations center or security team.

Section 1
We 6:30 pm - 8:00 pm
Instructor(s): Kristy Westphal

Web applications play a vital role in every modern organization. If an organization does not properly test its web applications to identify security flaws, adversaries may be able to compromise these applications damaging functionality and accessing sensitive data. The focus of this course is on developing practical web application security testing skills required to assess a web application's security posture and convincingly demonstrate the business impact of discovered vulnerabilities, if exploited. The course includes both lectures and a variety of demonstrations and hands-on exercises in finding web application security vulnerabilities. During the course, students learn about assessment tools and methodologies.

Section 1
TuTh 6:30 pm - 8:00 pm
Instructor(s): Jennia Hizver

This capstone course will cement skills and knowledge learned throughout the Master of Information and Cybersecurity program: core cybersecurity technical skills, understanding of the societal factors that impact the cybersecurity domain and how cybersecurity issues impact humans, and professional skills such as problem-solving, communication, influencing, collaboration, and group management – to prepare students for success in the field. The centerpiece is a semester-long group project in which teams of students propose and select a complex cybersecurity issue and apply multi-faceted analysis and problem-solving to identify, assess, and manage risk and deliver impact.

Section 1
Tu 4:00 pm - 5:30 pm
Instructor(s): Ryan Liu, Sekhar Sarukkai
Section 2
We 4:00 pm - 5:30 pm
Instructor(s): Ryan Liu, Sekhar Sarukkai