ACES Program staff are working remotely to protect community health. Please connect with us via phone and email.

The ACES Minor features a 16 credit customizable curriculum including experiential learning.

Foundation Courses (1-5 credits)

Required if did not complete ACES LLP AND have not taken CMSC216

This course introduces students to the technical foundations of cybersecurity through discussion, practice in statistics, and lessons in UNIX.

Offered Fall 2018.

Required course for students who did not complete the ACES Living-Learning Program

The group project in this course will combine technical, analytical, and communication skills, further engaging students in the practice of cybersecurity as they complete a team project designing, deploying, and collecting and analyzing data from a honeypot.

All ACES Minor students must take at least 1 credit of HACS 318

This course includes opportunities to interact with industry leaders in the cybersecurity field through guest lectures, field trips, and special topic presentations. Topics include cybersecurity threats, entrepreneurship, and innovation in cybersecurity, and cybersecurity policy.

Electives (9-12 credits)

Choose at least three of the following 400-level courses:

HACS408 Advanced Seminar in Cybersecurity (3 credits)

The Advanced Seminars in Cybersecurity explore various topics within the cybersecurity field.

This course is designed to prepare students to participate in culturally responsible and environmentally-appropriate communication in the work force. Students will explore the industry standards for writing technical reports, as well as the variances between persuasive, team, written, and oral communication styles. 

This course will focus on advanced techniques for discovering software features, be they intended or unexpected, accessible or obfuscated. Working from source code down to the physical components of a computer, students will learn to use Tetrane REVEN-Axion for reverse engineering obfuscated malware; and locating, exploiting, and mitigating vulnerabilities all software layers (drivers, kernel, middleware, application) in order to reverse engineer unknown programs.

This advanced digital forensics course will aim to build an in-depth understanding of industry standard techniques to recover and analyze forensic data from multiple environments and devices to characterize and track malicious user activity. Topics include memory forensics, file system analysis, malware detection, timeline analysis, and detection and analysis of execution artifacts. These topics are presented in a lab-centric course using commercial forensics and open source tools.

This course for ACES Minor students is an introduction to the security implications of interrelated computing devices known as Internet of Things (IoT) and Cyber Physical Systems (CPS). Topics include but are not limited to, secure application development for IoT/CPS, IoT/CPS environment types, IoT/CPS threat categories, security services, distributed application architectures, activity privacy, and intrusion detection/prevention. Students will participate in a semester long group project involving significant research, design, and implementation. Students should have taken CMSC216 in order to be successful in this course.

This course provides a set of practical tools for analyzing large, complex systems for the impact and implementation for Cyber Security as well as analyzing the needs of the individuals within that system - like you.  We will answer the following questions: (1) What is a system? These include not just IT systems, but human and behavioral systems, as well as system-of-systems {SoS}. (2) How can we define, understand, and analyze Cyber requirements, wants and needs? (3) How do we analyze 2nd and 3rd order effects of implementing those requirements on the overall system of concern in terms of performance and requirements satisfaction? (4) How do we apply lessons learned from other systems to the systems under consideration? (5) What is a threat vector and how will it impact my decisions? The course will present practical methodologies for analyzing requirements  and their effects through case studies as well as the principles used to evaluate them. The course stresses analysis and appropriate methods for clearly and concisely communicating the results of analysis to system users and stakeholders.  This course is for both those with an engineering background and for those who do not have any engineering background and provides a systemic framework in analyzing problems and applying systems thinking to solve them.

This course will be a rigorous hands-on, technically challenging experience to prepare students for real-world work in penetration testing and offensive security. Students will gain proficiency and become comfortable using the tools, techniques, and methodologies that represent the state of the art in penetration testing today. Students should be very comfortable on the command line, and a technical exposure to networking and proficiency in some scripting language (Bash, Ruby, Python) is expected.

This course focuses on exploring and analyzing cybersecurity-related data. Data visualization is useful for quickly and easily viewing and identifying features of interest during data exploration, as well as highlighting key aspects when communicating results of data analysis. Understanding the context and interpretation of different sources and types of cybersecurity data commonly available is an important component to performing meaningful data analysis and can help guide the selection of analysis methods useful for extracting information from the data.

Students may also substitute two courses or up to 6 credits from the following 400-level courses: CCJS418B, CMSC412, CMSC414, CMSC417, CMSC/MATH456, CMSC498R, CMSC498Y, ENEE447, ENEE457, ENEE459B, ENEE459E, ENME442, MLAW358E, INST464, and INST467.

Experiential Learning Requirements

Students will complete 3 credits of experiential learning from research.

Students are required to engage in research in order to gain greater insight into a specific area within cybersecurity, obtain an appreciation for the subtleties and difficulties associated with the production of knowledge and fundamental new applications, and to prepare for graduate school and/or the workforce.

Students may receive HASC498 credit for participation on a team project offered by one of the ACES corporate partners. Each participant will work in a small group over the course of one semester working to complete mid-semester and final reports to be submitted for review by the ACES leadership team.