The ACES Minor features a 16 credit customizable curriculum including experiential learning. All ACES Minor students must complete a minimum of 16 credits to earn the ACES Minor.

Foundation Courses (1-5 credits)

Students must complete foundation courses before they are eligible to enroll in experiential learning courses.

Required if did not complete ACES LLP AND have not taken CMSC216

This course introduces students to the technical foundations of cybersecurity through discussion, practice in statistics, and lessons in UNIX.

Required course for students who did not complete the ACES Living-Learning Program

The group project in this course will combine technical, analytical, and communication skills, further engaging students in the practice of cybersecurity as they complete a team project designing, deploying, and collecting and analyzing data from a honeypot.

All ACES Minor students must take at least 1 credit of HACS 318

This course includes opportunities to interact with industry leaders in the cybersecurity field through guest lectures, field trips, and special topic presentations. Topics include cybersecurity threats, entrepreneurship, and innovation in cybersecurity, and cybersecurity policy.


Electives (9-12 credits)

Choose at least three of the following 400-level courses:

HACS408 Advanced Seminar in Cybersecurity (3 credits)

The Advanced Seminars in Cybersecurity explore various topics within the cybersecurity field.

This course is designed to prepare students to participate in culturally responsible and environmentally-appropriate communication in the work force. Students will explore the industry standards for writing technical reports, as well as the variances between persuasive, team, written, and oral communication styles. 

This course will allow students to explore leadership in the cybersecurity sector as well as learn about powerful and impactful leadership models that are not sector-bound. Additionally, students will learn about diversity and inclusion as it relates to the cybersecurity sector; explore best practices and strategies around these topics; and learn practical leadership tools, skills and strategies that will strengthen their ability to advance attention to these issues in their careers.

This course will focus on advanced techniques for discovering software features, be they intended or unexpected, accessible or obfuscated. Working from source code down to the physical components of a computer, students will learn to use Tetrane REVEN-Axion for reverse engineering obfuscated malware; and locating, exploiting, and mitigating vulnerabilities all software layers (drivers, kernel, middleware, application) in order to reverse engineer unknown programs.

This advanced digital forensics course will aim to build an in-depth understanding of industry standard techniques to recover and analyze forensic data from multiple environments and devices to characterize and track malicious user activity. Topics include memory forensics, file system analysis, malware detection, timeline analysis, and detection and analysis of execution artifacts. These topics are presented in a lab-centric course using commercial forensics and open source tools.

An exploration of cyber risk management and present-day cyber threats, their impacts, and their mitigations. Students will take a multi-disciplinary approach to understanding cyber threats and risks including the technical, policy, and social aspects. This course is guided by real-world case studies.

This course for ACES Minor students is an introduction to the security implications of interrelated computing devices known as Internet of Things (IoT) and Cyber Physical Systems (CPS). Topics include but are not limited to, secure application development for IoT/CPS, IoT/CPS environment types, IoT/CPS threat categories, security services, distributed application architectures, activity privacy, and intrusion detection/prevention. Students will participate in a semester long group project involving significant research, design, and implementation. Students should have taken CMSC216 in order to be successful in this course.

This course will be a rigorous hands-on, technically challenging experience to prepare students for real-world work in penetration testing and offensive security. Students will gain proficiency and become comfortable using the tools, techniques, and methodologies that represent the state of the art in penetration testing today. Students should be very comfortable on the command line, and a technical exposure to networking and proficiency in some scripting language (Bash, Ruby, Python) is expected.

This course focuses on exploring and analyzing cybersecurity-related data. Data visualization is useful for quickly and easily viewing and identifying features of interest during data exploration, as well as highlighting key aspects when communicating results of data analysis. Understanding the context and interpretation of different sources and types of cybersecurity data commonly available is an important component to performing meaningful data analysis and can help guide the selection of analysis methods useful for extracting information from the data.

Students may also substitute two courses or up to 6 credits from the following 400-level courses: CCJS418B, CMSC412, CMSC414, CMSC417, CMSC/MATH456, CMSC498R, CMSC498Y, BUDT758D, ENEE447, ENEE457, ENEE459B, ENEE459E, ENME442, MLAW358E, INST464, and INST467.

Experiential Learning Requirements

Students will complete 3 credits of experiential learning from research. Please note that students must complete foundation courses before they are eligible to enroll in experiential learning courses.

Students are required to engage in research in order to gain greater insight into a specific area within cybersecurity, obtain an appreciation for the subtleties and difficulties associated with the production of knowledge and fundamental new applications, and to prepare for graduate school and/or the workforce.

Students may receive HASC498 credit for participation on a team project offered by one of the ACES corporate partners. Each participant will work in a small group over the course of one semester working to complete mid-semester and final reports to be submitted for review by the ACES leadership team. 


Top