CYBER SECURITY AND INFORMATION ASSURANCE (CSIA)
Offered in: Chicago
CSIA 150 - COMPUTER SCIENCE I
General problem solving and the algorithm development process. Simple data types, sequence, selection, repetition, functions, records, files, and one-dimensional arrays. Concepts of top-down program design, testing, functional decomposition, and documentation using good programming style. A computer use course; higher level language such as C++ or Java.
CSIA 217 - INTRO TO PROB. & STATS
CSIA 236 - PYTHON SCRIPT PROGRAMMING
Using the Python programming language to learn the best-practices of programming and script-writing in a security and utility conscious environment.
CSIA 246 - DATA COMMUNICATIONS
Foundations of a data communication network architecture and the concepts of data representation in the data transmission process. Data communication methods and data services offered by common carriers. Data communication network management and design issues.
Course Notes: or instructor consent.
CSIA 250 - COMPUTER SCIENCE II
Continuation of CSIA 150; development of problem solving using a high level language including abstract data types, multidimensioned arrays; strings; records and structures; function design, construction, and parameter passing methods; recursion; introduction to objects and classes; pointers: lists, stacks, queues, and trees; and file I/O. Multiple sorting and searching algorithms including concepts of program complexity. Extensive programming required. A computer use course.
Course Notes: Math 245 recommended.
CSIA 255 - OPEN SOURCE COMMUNITIES
Exploration of the Open Source world, its history, and its contribution to current topics such as social justice, information freedom, equality and the nature of democracy. Discussion of the role it has played in recent events. Investigation of the politics of the open source world and their relationship to traditional geopolitics. In addition, this course will also seriously examine the practical side of open source and its economic impact on both businesses and households in the developed and developing worlds.
Prerequisites: ENG 102
CSIA 261 - COMPUTER ORGANIZATION
Introduction to computer hardware structure using assembler language. Internal hardware and software structure of a CPU that is normally hidden from programmers using a high level language. Extensive programming in the assembler language of the CPU. A computer use course.
CSIA 301 - COMPUTER NETWORKING
This is an introductory course on the design and analysis of computer networks. It covers Internet protocols, application layer protocols, routing, wireless communication, and basic network security problems.
CSIA 317 - OPERATING SYSTEMS
An in-depth study of the components and functions of computer operating systems. Topics include system services, file system management, memory management, resource allocation, scheduling, processing levels, multitasking, deadlocks, and interprocess protection mechanisms. Programming projects involve use of system calls in UNIX and Windows. A computer use course.
CSIA 318 - UNIX AND SYSTEM ADMINISTRATION
Programming on a UNIX-based computer system. How to use standard UNIX utilities such as ssh, scp, vi, awk, grep, sed, emacs, as well as script writing in Perl. How to use X Windows and UNIX GUI tools. UNIX programming environment with an overview of the UNIX process model. Basic UNIX administration including system tool and configuration files.
CSIA 319 - CYBER OPS
The Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers. The Cyber Ops certification program provides practical, relevant, and job-ready certification curricula aligned closely with the specific tasks expected of these in-demand professionals. The Security Operations Center (SOC) Analyst increasingly must focus on design, configuration, and support responsibilities as the technical consultant and device specialist or expert on a security team. Therefore, the curriculum is specific to the best practices of network security administrators, engineers, and experts.
CSIA 327 - SOFTWARE ENGINEERING
In depth examination of criteria for software quality and the types of development processes that support its creation. Best practices in software development are examined as well as case studies in software design and maintenance. Individual assignments and some group work as well.
CSIA 333 - DATABASE SYSTEMS
Theory and practice of databases with emphasis on how to create, maintain, and query a database with SQL. Relational databases and relational algebra; queries and data manipulation in SQL, constraints, triggers, views, controlling security, data modeling, and normalization, recursive queries, indexing, XML, and other topics.
CSIA 335 - ETHICAL HACK & COUNTERMEASURES
This is a hands-on Cyber Security course that will prepare students for the Certified Ethical Hacker certification. The course is an introduction to ethical hacking tools and incident handling. Areas of instruction include various security tools and vulnerabilities of operating systems, software and networks used by different type of hackers to access unauthorized information. This course also addresses incident handling techniques used when information security is compromised.
CSIA 336 - PRACTICAL COMPUTING WITH DATA IN PYTHON
Focuses on using a simple programming language python to work with data when Excel, SPSS and similar tools are not adequate. When tables are too big or the desired result is difficult or impossible to express in terms of formulas, using python can be the quickest, easiest and most productive way to derive value from data in a scientific or enterprise setting. This course provides the skills and understanding required to succeed in these situations.
CSIA 352 - NETWORK DESIGN
Communication system organization, and structure. Detailed examination of various communication protocols, routing mechanisms, and interfaces used in digital networks.
CSIA 354 - INTRODUCTION TO PROGRAMMING
An introduction to the methods and procedures for the development of logical, well-structured computer programs using the Java programming language. The three logical constructs of sequence, selection, and iteration are emphasized. In addition, we’ll focus on Object-oriented programming including abstract data types, inheritance, and polymorphism, fundamental data structures used throughout Computer Science, and algorithm analysis. Extensive programming required. A computer use course.
Course Notes: Restricted to graduate student in bridge program as this, covers requirements for 150/250.
CSIA 355 - APPLIED CRYPTOGRAPHY
Cryptography provides algorithms and protocols for secure communication over an insecure channel. These tools are also used in many other aspects of information security such as access control or digital signature. Cryptography plays a crucial role in a wide scope of real-world applications, from the classical military and national security applications to email and online banking. The course focuses on concepts and techniques underlying public-key cryptography. It also covers more advanced cryptographic tasks, for example, identification schemes.
Prerequisites: CST 150 and CST 245
CSIA 359 - INTRO TO COMPUTER SECURITY
This course provides an introduction to computer and network security. It covers the basic concepts in computer and network security. The course also provides examples of intrusions and corresponding defense. Some topics in security research will be covered.
CSIA 368 - INTERNET SECURITY
Security issues pertaining to Internet, intranet, and the Web. Web security from the point of view of the user, programmer, and system administrator. HTTP authentication, proxy servers and firewalls; Internet security protocols and Secure Socket Layer; electronic payment systems; certificate management and network access layer security; executable content and scripting languages; mobile code and copyrights. Privacy protection; legal and ethical issues; anonymous browsing and censorship; available security tools.
CSIA 389 - SP TOP:CYBER/INFO SECURITY
Special Technical Topics in Cyber/Information Security.
CSIA 390 - SP TOP:CYBER/INFO SECURITY
Special Topics in Cyber Security and Information Assurance. Topics may vary.
CSIA 394 - CYBER/INFO SECURITY INTERSHIP
Course Notes: Consent of Cyber Security Center Director required.
CSIA 395 - INDEPENDENT STUDY
Students must obtain a cyber faculty sponsor; prepare a written proposal that includes course objectives, time table, and measurable evaluation criteria; and receive approval from both the faculty sponsor and director of the Cyber Security Center.
Course Notes: Approval of Cyber faculty sponsor and Cyber Security Center, Director required.
CSIA 399 - SENIOR PROJECT
Project to be undertaken at the end of the program of study. Students must obtain a cyber faculty sponsor; prepare a written proposal that includes course objectives, time tables, and measurable evaluation criteria; and receive approval from both the cyber faculty sponsor and Director of the Cyber Security Center. Approval of Cyber faculty sponsor and Cyber Security Center Director.
Course Notes: Approval of Cyber faculty sponsor and Cyber Security Center, Director.
CSIA 401 - INTRO TO COMPUTER SECURITY
This course provides an introduction to computer security. It covers the basic concepts in computer security. The course also provides examples of intrusions and corresponding defense. Some topics in security research will be covered.
Course Notes: CST 317 OPERATING SYSTEMS IS REQUIRED WITHA GRADE OF C- OR, HIGHER.
CSIA 409 - CLOUD COMPUTING AND SECURITY
This course provides an introduction to cloud computing and cloud computing security. It covers the basic concepts of cloud computing including virtualization architecture, cloud services, and security problems. The course provides examples of virtualization techniques and security problems. Some topics in cloud computing research will also be covered.
CSIA 410 - PLANNING AND BUDGETING THE CISO LIFECYCLE
The course covers the ways in which the CISO can apply a knowledge of financial and budgeting processes across the full scope of an enterprise to improve decision making, enhance financial monitoring and performance, lead and evaluate resource tradeoff decisions, articulate the return on investment of security systems and investments, comply with best-practices, ethics and financial management policies, and provide the greatest security value for the cost. The first half of the course establishes the context and basics of financial management and budgeting and the second half of the course builds on that knowledge through application in a variety of common financial management scenarios such as security systems acquisitions, contract financial management, program budgeting and justification, and coping with change.
CSIA 411 - CYBER ETHICS, PRIVACY, & LEGAL
IT professionals, security professionals, and organizational leaders face new and challenging legal and ethical issues created by escalating security issues as a result of the incredible impact of information technology on businesses, other organizations, and society as a whole. This course explores many of these issues and provides an opportunity for students to discuss their ramifications in depth. This course is organized in a seminar format with a focus on class discussion. Discussion will take place using electronic forums and discussion papers. Real and hypothetical situations will be explored to provide opportunities for discussion and debate.
CSIA 414 - ENTERPRISE CONTINUITY & RECOVERY PLANNING
The course covers Enterprise Continuity Planning, a methodology used to create and validate a plan for maintaining continuous business operations before, during, and after disasters or disruptive events. It also covers Disaster Recovery,stopping the effects of disasters, and addressing the immediate aftermath.
CSIA 438 - SECURE SOFTWARE ENGINEERING
This course mainly covers the design and implementation of secure software. The characteristics of secure software, security role in the development lifecycle, the designing secure software, and best security programming practices will be covered.
CSIA 451 - NETWORKS SECURITY
The course explores mechanisms for protecting networks against attacks with an emphasis placed on network security applications for the Internet. The course also investigates various networking security problems and defense mechanisms.
Prerequisites: CST 401
CSIA 475 - COMPUTER FORENSICS
An introduction to the procedures and techniques used to identify, extract, validate, document and preserve electronic evidence. General legal issues such as the proper handling of evidence, chain of custody, and admissibility in court also covered.
CSIA 485 - THESIS/PROJECT RESEARCH
Planning and implementation of research component of student's MS thesis or project.
CSIA 490 - MASTERS THESIS
Completion of the MS Thesis.
Prerequisites: CSIA 485
Course Notes: Approval of CSIA faculty sponsor and Dept. Chair.
CSIA 494 - INTERNSHIP
Course Notes: Approval of CSIA faculty sponsor and Dept. Chair.
CSIA 499 - MASTERS PROJECT
The MS Project.
Prerequisites: CSIA 485