ACES Minor Curriculum

The ACES Minor features a 16 credit customizable curriculum including experiential learning.

Category Course Title Credits
Foundation Courses
1-4 credits
HACS202
Group Project in Cybersecurity
Required for students who did not complete ACES LLP
3
HACS318
Cybersecurity Professionals Colloquium Series
All students must take at least 1 credit of HACS318
1
 
Electives
9-12 credits
 
 
HACS408 Advanced Seminars in Cybersecurity; various topics 3
Varied
Students may substitute up to 2 electives from the following 400-level courses: CMSC412, CMSC414, CMSC456, ENEE447, ENEE457 & ENME442. In addition, CCJS418B, CMSC498, & ENEE459 may be substituted when topic is approved.
3
Experiential Learning
3-6 credits
HACS479
Undergraduate Research in Cybersecurity
Repeatable up to 6 credits
1-3
HACS498
Cybersecurity Team Problem Solving
Repeatable up to 6 credits
3

Foundation Courses (1-4 credits)

HACS202 Group Project in Cybersecurity (3 credits)
Required course for students who did not complete the ACES Living-Learning Program.
The group project in this course will combine technical, analytical, and communication skills, further engaging students in the practice of cybersecurity as they complete a team project designing, deploying, and collecting and analyzing data from a honeypot. 

HACS318 Cybersecurity Professionals Colloquium Series (1 credit) 
All ACES Minor students must take at least 1 credit of HACS 318. 
This course includes opportunities to interact with industry leaders in the cybersecurity field through guest lectures, field trips, and special topic presentations. Topics include cybersecurity threats, entrepreneurship and innovation in cybersecurity, and cybersecurity policy. 

Electives (9-12 credits)

Choose at least three of the following 400-level courses:

HACS408 Advanced Seminar in Cybersecurity (3 credits)
The Advanced Seminars in Cybersecurity explore various topics within the cybersecurity field. 

  • D.  Decision Processes in Cybersecurity

​This course will explore the ways that people make decisions about cybersecurity and how that behavior affects outcomes. We will discuss the types of information-search and decision-making strategies that people, including policy-makers, designers, operators, and users, employ when interacting with computer systems. As part of this exploration, we will also discuss ways to empirically investigate and assess cybersecurity behaviors. The underlying concepts will allow us to propose ways to shape behavior and assess whether that shaping has been effective.

  • E.  Applied Reverse Engineering

This course will focus on advanced techniques for discovering software features, be they intended or unexpected, accessible or obfuscated.  Working from source code down to the physical components of a computer, students will learn to use Tetrane REVEN-Axion for reverse engineering obfuscated malware; and locating, exploiting, and mitigating vulnerabilities all software layers (drivers, kernel, middleware, application) in order to reverse engineer unknown programs. 

  • L.  Analytical and Forensic Techniques in Cybersecurity

This advanced digital forensics course will aim to build an in-depth understanding of industry standard techniques to recover and analyze forensic data from multiple environments and devices to characterize and track malicious user activity.  Topics include memory forensics, file system analysis, malware detection, timeline analysis, and detection and analysis of execution artifacts. These topics are presented in a lab-centric course using commercial forensics and open source tools.

  • T.  Penetration Testing

This course will be a rigorous hands-on, technically challenging experience to prepare students for real-world work in penetration testing and offensive security. Students will gain proficiency and become comfortable using the tools, techniques, and methodologies that represent the state of the art in penetration testing today. Students should be very comfortable on the command line, and a technical exposure to networking and proficiency in some scripting language (Bash, Ruby, Python) is expected.

  • V.  Data Analysis and Visualization for Cybersecurity

This course focuses on exploring and analyzing cybersecurity related data. Data visualization is useful for quickly and easily viewing and identifying features of interest during data exploration, as well as highlighting key aspects when communicating results of data analysis. Understanding the context and interpretation of different sources and types of cybersecurity data commonly available is an important component to performing meaningful data anlaysis and can help guide the selection of analysis methods useful for extracting information from the data.

Students may also substitute up to two electives from the following 400-level courses: CCJS418B, CMSC412, CMSC414, CMSC417, CMSC/MATH456, CMSC498R, CMSC498Y, ENEE447, ENEE457, ENEE459B, ENEE459E and ENME442.

Experiential Learning (3-6 credits)

Take at least 3 but not more than 6 credits from the following options:

HACS479 Research in Cybersecurity (1-3 credits, up to a maximum of 6 credits)

HACS498 Cybersecurity Team Problem Solving (3 credits, up to a maximum of 6 credits)