Crypto-protocols & Network Security (Track Core)

The course covers authentication protocols, key distributions protocols, e-commerce security protocols. Security protocol properties: authentication, secrecy, integrity, availability, non-repudiation, atomicity, certified delivery; crypto-protocol attacks; security protocols design, implementation and analysis. OSI security architecture, models and architectures for network security

Introduction to Information Security & Cryptography (Track Core)

An overview of operating system security; network security, including cryptography and cryptographic protocols, firewalls, and network denial-of-service attacks and defenses; user authentication technologies; security for network servers; web security; and security for mobile code technologies; intrusion detection; techniques to provide privacy in Internet applications; and protecting digital


The course examines the foundations of blockchain technology from multiple perspectives, including engineering, security, and economics. It is designed to provide students with an understanding of key concepts and developments around cryptocurrencies and distributed ledger systems. The course offers a comprehensive survey of relevant topics in cryptocurrency, distributed consensus, and the wider


Information Security Governance

The course covers basics of Information Security Governance, Security Governance vs. IT Governance, regulatory requirements for information security, the needs and benefits of the governance approach, Information Security Governance program and its deliverables, establishing the ISG processes in the organization, aligning the ISG to the organization’s strategy and goals, the associated roles and


Information Security Ethics, Policy and Legal Issues

The course covers how to identify and prioritize information assets, identify and prioritize threats to information assets, define an information security policy, develop, implement and maintain various security policies, implement information security constraints used to prevent misuse of information on an organization’s human resources process, and to know the role of culture in ethics as it


Security Evaluation Methodologies

The course discusses security evaluation of information systems, security evaluation of software, security evaluation of products, security code inspection, security testing, security standards, preparation of a security evaluation: impact scale, likelihood scale, severity scale, vulnerability analysis, risk analysis, security plan elaboration, common criteria, target of evaluation, protection


Security Incident Handling

The course provides an overview of security incident response and emergency handling activities. Topics covered include detecting and characterizing an attack; forensics and evidence collection; understanding the technical issues of different attack types; and performing analysis and response tasks for various types of incidents. The course also outlines how to build and manage computer incident


Operating Systems & Applications Security (Track Core)

The course covers fundamental concepts and mechanisms for enforcing security and defining secure operating systems, defining an ideal secure operating system, the first OS designed for security goals, systems development approaches applied to build a secure operating system, access control fundamentals, formal security goals and corresponding security models proposed for secure operating systems

Security in Wireless Ad Hoc Networks

The course covers security measures for different types of wireless networks, the challenges associated with securing ad hoc networks, the different attacks on Ad hoc networks, the different types of intrusion detection systems used for ad hoc networks, the reputation systems as an approach to securing ad hoc networks. Upon completing the course the students will be able to describe the different


Systems Engineering (Common Core)

Introduction to system engineering outlining traditional design process. The content of the course follows typical system design life cycle. It correlates the different disciplines required to deploy and sustain a system for missions in information technology, information processing and electronics domains. Topics include system architecture into hardware and software components, requirement

Software Engineering

This course focuses on critical aspects of the software development life cycle that have significant influence on the overall quality of the software system including techniques and approaches to software design, quantitative measurement and assessment of the system during implementation, testing, and maintenance, and the role of verification and validation in assuring software quality.

Computer Architecture

The course includes an overview of history and current and future trends and issues in processor design, as well as performance measurement and enhancement techniques. Topics covered include pipelining, parallelism, multiprocessors, cache & memory issues, and interconnections networks.

Stochastic Processes

This course introduces random processes and their applications from a discrete-time point of view, and discusses the continuous-time case when necessary. The course covers the basic concepts of random variables, random vectors, stochastic processes, and random fields. It moves on to common random processes including the white noise, Gaussian processes, Markov processes, Poisson processes, and

Information Theory

Prerequisite: CIT 604. This course covers mathematical models for channels and sources. The basic concepts of entropy, relative entropy, and mutual information are defined, and their connections to channel capacity, coding, and data compression are presented. Limits for error-free communication, information theory also presents limits for data compression, information, data compression, Topics

Fundamental of Networking

This course covers fundamental concepts in the design and implementation of computer networks. Examples are drawn primarily from the Internet protocol suite. In the first part of the course, we will cover layered networking models, application layer protocols, transport layer protocols, the Internet Protocol (IP), and intenetworking. In addition, advanced topics such as wireless networks and

Operations Research

This course introduces the fundamentals of operations research, including different techniques for modeling and problem solving. The course will emphasize model-formulation skills, the mathematical procedures of linear programming, network flows, dynamic programming, game theory Markov chains, queuing models, and other problem solving techniques.