Cyber Operations Concentration
The Cyber Operations Concentration builds upon the current ABET Accredited BS in Computer Science by adding a set of six courses that focus on Cyber Operations and provide hands-on experience with tools and techniques for investigating, analyzing, and responding to cyber attacks.
- CSE 3801 Introduction to Cybersecurity (Fall)
- CSE 3810 Cyber Defense (Spring)
- CSE 4820 Wireless / Mobile Security (Fall)
- CSE 4830 Software Reverse Engineering (Fall)
- CSE 4840 Cyber Offense (Spring)
- CSE 4850 Vulnerability Research (Spring)
CSE 3801 Introduction to Cybersecurity
Examines the concepts and terminology of cyber operations from a practical point of view. Discusses ethical and legal considerations of cyber operations. Introduces vulnerability analysis and exploit development. Examines recent security-related trends and technologies.
CSE 3810 Cyber Defense
Examines the defense of information technology from a practical point of view. Introduces security principles, design, methods for reducing complexity and detection of reconnaissance, malicious traffic, and covert channels. Students will both design and implement a defense architecture by leveraging risk models including NIST SP 800-37 /39.
CSE 4820 Wireless / Mobile Security
Examines the security and privacy of wireless and mobile technologies from a practical point of view. Discusses cryptographic primitives and proper association and authentication of users. Examines a lengthy history of design/implementation flaws in various wireless technologies. Discusses recent wireless security-related trends and technologies.
CSE 4830 Software Reverse Engineering
Examines different assembly languages and the study of how compilers generate the control flows in each language. Focuses on the constructs of If, If-then-else, Switch, and Loops. Discusses anti-RE techniques, C++ naming, polymorphism and vftables, static/dynamically-compiled programs, and embedded/mobile devices.
CSE 4840 Cyber Offense
Examines offensive cyber operations scenarios from both a strategic and tactical point of view. Discusses strategic concepts including the planning, execution, and phases of cyber operations. Enumerates attack methods in the cyber kill chain and MITRE Att&ck Framework through practical exercises. Reviews case studies of offensive cyber operations.
CSE 4850 Vulnerability Research
Introduces exploit development by static and dynamic analysis of vulnerabilities. Provides a taxonomy of vulnerabilities including buffer overflows, use-after-free, format strings, and logic bugs. Examines the concept of overcoming exploit mitigation strategies with return-oriented programming and memory-leaks.