The ACES Minor features a 16 credit customizable curriculum including experiential learning.

Foundation Courses (1-4 credits)

Required if did not complete ACES LLP AND have not taken CMSC216

This course introduces students to the technical foundations of cybersecurity through discussion, practice in statistics, and lessons in UNIX.

Offered Fall 2018.

Required course for students who did not complete the ACES Living-Learning Program

The group project in this course will combine technical, analytical, and communication skills, further engaging students in the practice of cybersecurity as they complete a team project designing, deploying, and collecting and analyzing data from a honeypot.

Offered Fall 2018.

All ACES Minor students must take at least 1 credit of HACS 318

This course includes opportunities to interact with industry leaders in the cybersecurity field through guest lectures, field trips, and special topic presentations. Topics include cybersecurity threats, entrepreneurship and innovation in cybersecurity, and cybersecurity policy.

Offered Spring 2018.


Electives (9-12 credits)

Choose at least three of the following 400-level courses:

HACS408 Advanced Seminar in Cybersecurity (3 credits)

The Advanced Seminars in Cybersecurity explore various topics within the cybersecurity field.

It could cover some of the Information Assurance material and some risk analysis along with looking at some other examples, such as looking into and examining some of the publicized security failures in the news or recent years and other things like hardware security aspects 

​This course will explore the ways that people make decisions about cybersecurity and how that behavior affects outcomes. We will discuss the types of information-search and decision-making strategies that people, including policy-makers, designers, operators, and users, employ when interacting with computer systems. As part of this exploration, we will also discuss ways to empirically investigate and assess cybersecurity behaviors. The underlying concepts will allow us to propose ways to shape behavior and assess whether that shaping has been effective.

This course will focus on advanced techniques for discovering software features, be they intended or unexpected, accessible or obfuscated. Working from source code down to the physical components of a computer, students will learn to use Tetrane REVEN-Axion for reverse engineering obfuscated malware; and locating, exploiting, and mitigating vulnerabilities all software layers (drivers, kernel, middleware, application) in order to reverse engineer unknown programs.

Offered Fall 2018 by Catherine Redfield.

This seminar will take an international view of cybersecurity policy looking at how public and private sectors in 3-4 countries deal with a variety of issues that cluster around cyber users, governance, and foreign policy. The seminar will review the cyber backbone, the physical telecommunications infrastructure that carries and stores data, learning about the interplay of policy, technology and business along various parts of the backbone before concluding with an examination of how the importance of cybersecurity policy will likely increase as at or just-over-the horizon technologies, such IoT, 5G, AI, Big Data, and Edge Computing, mature.

Offered Fall 2018 by Kelly Wong.

This advanced digital forensics course will aim to build an in-depth understanding of industry standard techniques to recover and analyze forensic data from multiple environments and devices to characterize and track malicious user activity. Topics include memory forensics, file system analysis, malware detection, timeline analysis, and detection and analysis of execution artifacts. These topics are presented in a lab-centric course using commercial forensics and open source tools.

Offered Fall 2018 by Brian Osborn.

This course will be a rigorous hands-on, technically challenging experience to prepare students for real-world work in penetration testing and offensive security. Students will gain proficiency and become comfortable using the tools, techniques, and methodologies that represent the state of the art in penetration testing today. Students should be very comfortable on the command line, and a technical exposure to networking and proficiency in some scripting language (Bash, Ruby, Python) is expected.

Offered Spring 2018 by Kevin Bock.

This course focuses on exploring and analyzing cybersecurity-related data. Data visualization is useful for quickly and easily viewing and identifying features of interest during data exploration, as well as highlighting key aspects when communicating results of data analysis. Understanding the context and interpretation of different sources and types of cybersecurity data commonly available is an important component to performing meaningful data analysis and can help guide the selection of analysis methods useful for extracting information from the data.

Offered Spring 2018 by Ed Condon.

Students may also substitute up to two electives from the following 400-level courses: CCJS418B, CMSC412, CMSC414, CMSC417, CMSC/MATH456, CMSC498R, CMSC498Y, ENEE447, ENEE457, ENEE459B, ENEE459E, ENME442, and MLAW358E.


Top