Introduction to Information Security & Cryptography

An overview of operating system security; network security, including cryptography and cryptographic protocols, firewalls, and network denial-of-service attacks and defenses; user authentication technologies; security for network servers; web security; and security for mobile code technologies; intrusion detection; techniques to provide privacy in Internet applications; and protecting digital


Crypto-protocols & Network Security

The course covers authentication protocols, key distributions protocols, e-commerce security protocols. Security protocol properties: authentication, secrecy, integrity, availability, non-repudiation, atomicity, certified delivery; crypto-protocol attacks; security protocols design, implementation and analysis. OSI security architecture, models and architectures for network security


Operating Systems & Applications Security

The course covers fundamental concepts and mechanisms for enforcing security and defining secure operating systems, defining an ideal secure operating system, the first OS designed for security goals, systems development approaches applied to build a secure operating system, access control fundamentals, formal security goals and corresponding security models proposed for secure operating systems


Security in Wireless Ad Hoc Networks

The course covers security measures for different types of wireless networks, the challenges associated with securing ad hoc networks, the different attacks on Ad hoc networks, the different types of intrusion detection systems used for ad hoc networks, the reputation systems as an approach to securing ad hoc networks. Upon completing the course the students will be able to describe the different


Security Evaluation Methodologies

The course discusses security evaluation of information systems, security evaluation of software, security evaluation of products, security code inspection, security testing, security standards, preparation of a security evaluation: impact scale, likelihood scale, severity scale, vulnerability analysis, risk analysis, security plan elaboration, common criteria, target of evaluation, protection


Security Incident Handling

The course provides an overview of security incident response and emergency handling activities. Topics covered include detecting and characterizing an attack; forensics and evidence collection; understanding the technical issues of different attack types; and performing analysis and response tasks for various types of incidents. The course also outlines how to build and manage computer incident


Information Security Ethics, Policy and Legal Issues

The course covers how to identify and prioritize information assets, identify and prioritize threats to information assets, define an information security policy, develop, implement and maintain various security policies, implement information security constraints used to prevent misuse of information on an organization’s human resources process, and to know the role of culture in ethics as it


Information Security Governance

The course covers basics of Information Security Governance, Security Governance vs. IT Governance, regulatory requirements for information security, the needs and benefits of the governance approach, Information Security Governance program and its deliverables, establishing the ISG processes in the organization, aligning the ISG to the organization’s strategy and goals, the associated roles and



The course examines the foundations of blockchain technology from multiple perspectives, including engineering, security, and economics. It is designed to provide students with an understanding of key concepts and developments around cryptocurrencies and distributed ledger systems. The course offers a comprehensive survey of relevant topics in cryptocurrency, distributed consensus, and the wider