The ACES Minor features a 16 credit customizable curriculum including experiential learning.

Foundation Courses (1-5 credits)

Required if did not complete ACES LLP AND have not taken CMSC216

This course introduces students to the technical foundations of cybersecurity through discussion, practice in statistics, and lessons in UNIX.

Offered Fall 2018.

Required course for students who did not complete the ACES Living-Learning Program

The group project in this course will combine technical, analytical, and communication skills, further engaging students in the practice of cybersecurity as they complete a team project designing, deploying, and collecting and analyzing data from a honeypot.

All ACES Minor students must take at least 1 credit of HACS 318

This course includes opportunities to interact with industry leaders in the cybersecurity field through guest lectures, field trips, and special topic presentations. Topics include cybersecurity threats, entrepreneurship, and innovation in cybersecurity, and cybersecurity policy.

Electives (9-12 credits)

Choose at least three of the following 400-level courses:

HACS408 Advanced Seminar in Cybersecurity (3 credits)

The Advanced Seminars in Cybersecurity explore various topics within the cybersecurity field.

Students will be invited to explore concepts of leadership, power, and diversity, as well as learn to identify what leadership success looks like. Through a presentation of leadership techniques and tools, skills-building exercises, real-life case studies and interactions with leaders from all around the world, students will be equipped with the knowledge they need to step into leadership capacity and become an impactful leader themselves. Students will also get to dive into the leadership realities within the Cybersecurity sector and understand how their future leadership could promote a more inclusive and diverse sector.

This course will focus on advanced techniques for discovering software features, be they intended or unexpected, accessible or obfuscated. Working from source code down to the physical components of a computer, students will learn to use Tetrane REVEN-Axion for reverse engineering obfuscated malware; and locating, exploiting, and mitigating vulnerabilities all software layers (drivers, kernel, middleware, application) in order to reverse engineer unknown programs.

This seminar will take an international view of cybersecurity policy looking at how public and private sectors in 3-4 countries deal with a variety of issues that cluster around cyber users, governance, and foreign policy. The seminar will review the cyber backbone, the physical telecommunications infrastructure that carries and stores data, learning about the interplay of policy, technology and business along various parts of the backbone before concluding with an examination of how the importance of cybersecurity policy will likely increase as at or just-over-the horizon technologies, such IoT, 5G, AI, Big Data, and Edge Computing, mature.

This advanced digital forensics course will aim to build an in-depth understanding of industry standard techniques to recover and analyze forensic data from multiple environments and devices to characterize and track malicious user activity. Topics include memory forensics, file system analysis, malware detection, timeline analysis, and detection and analysis of execution artifacts. These topics are presented in a lab-centric course using commercial forensics and open source tools.

This course will be a rigorous hands-on, technically challenging experience to prepare students for real-world work in penetration testing and offensive security. Students will gain proficiency and become comfortable using the tools, techniques, and methodologies that represent the state of the art in penetration testing today. Students should be very comfortable on the command line, and a technical exposure to networking and proficiency in some scripting language (Bash, Ruby, Python) is expected.

This course focuses on exploring and analyzing cybersecurity-related data. Data visualization is useful for quickly and easily viewing and identifying features of interest during data exploration, as well as highlighting key aspects when communicating results of data analysis. Understanding the context and interpretation of different sources and types of cybersecurity data commonly available is an important component to performing meaningful data analysis and can help guide the selection of analysis methods useful for extracting information from the data.

Students may also substitute up to two electives from the following 400-level courses: CCJS418B, CMSC412, CMSC414, CMSC417, CMSC/MATH456, CMSC498R, CMSC498Y, ENEE447, ENEE457, ENEE459B, ENEE459E, ENME442, and MLAW358E.