This course focuses on the relationships among accounting, economics and cybersecurity. Topics include: (1) the cost-benefit aspects of managing cybersecurity resources, (2) determining the costs of cybersecurity breaches on corporations (3) deriving the optimal amount a firm should invest in cybersecurity activities.
Introduction to software reverse engineering tools and methodologies. Fundamental topics will be introduced: compilers, linkers, loaders, assembly language, as well as static and dynamic analysis tools. Hands-on work will develop the skills and knowledge used to reverse engineer a binary without access to the original source code.
This course examines the many roles, capabilities, organizations, and objectives involved in security incident handling and management. Core course content includes three major components: learning about the skills sets that people utilize in security incident handling and management, participating in role-playing exercises to understand how organizations involved in security incident handling interact, and finally putting it all together by conducting exercises in a lab environment simulating security incident discovery, handling, and management.
This course aims to build an in-depth understanding of project management methodologies for IT professionals. The course explores the applications of Project Management Institute (PMI) and industry standards for managing technical projects. Topics include an overview of PMI standards and project management, various roles in managing technical projects, work breakdown structures, security considerations, risk assessment, testing, and implementation. The students will have an opportunity to learn project management by applying these topics in a real world project scenario.
Students in this course will understand and differentiate between the various fields of digital forensics, such as memory, hard drive, and network traffic analysis. The course will cover the legalities involved with forensics investigations, explore the wide variety of digital forensics tools, including both open source and proprietary, and learn about the different types of forensic artifacts that can be acquired and analyzed.
This course will examine the implications of the information revolutions of the last 30-40 years and the effects on politics, law (domestic and international), economics, and society. The course will provide an overview of some of the implications of a volatile, extensive, and ongoing technological change and discuss the need for professionals who see cyberspace as a broad domain requiring multidisciplinary conversations and skills.
This course is a survey of games and puzzles and the logic and mathematics behind them. The course will include number theory, graph theory, and combinatorics, and will provide a broad survey of logic and math puzzles. Throughout the course, students will learn about puzzles and their place in math, science and cryptography. They will also acquire the important critical thinking and problem-solving skills necessary to analyze and solve these puzzles and understand what makes them difficult.