Courses
Crypto-protocols & Network Security (Track Core)
Introduction to Information Security & Cryptography (Track Core)
Blockchain
The course examines the foundations of blockchain technology from multiple perspectives, including engineering, security, and economics. It is designed to provide students with an understanding of key concepts and developments around cryptocurrencies and distributed ledger systems. The course offers a comprehensive survey of relevant topics in cryptocurrency, distributed consensus, and the wider
Information Security Governance
The course covers basics of Information Security Governance, Security Governance vs. IT Governance, regulatory requirements for information security, the needs and benefits of the governance approach, Information Security Governance program and its deliverables, establishing the ISG processes in the organization, aligning the ISG to the organization’s strategy and goals, the associated roles and
Information Security Ethics, Policy and Legal Issues
The course covers how to identify and prioritize information assets, identify and prioritize threats to information assets, define an information security policy, develop, implement and maintain various security policies, implement information security constraints used to prevent misuse of information on an organization’s human resources process, and to know the role of culture in ethics as it
Security Evaluation Methodologies
The course discusses security evaluation of information systems, security evaluation of software, security evaluation of products, security code inspection, security testing, security standards, preparation of a security evaluation: impact scale, likelihood scale, severity scale, vulnerability analysis, risk analysis, security plan elaboration, common criteria, target of evaluation, protection
Security Incident Handling
The course provides an overview of security incident response and emergency handling activities. Topics covered include detecting and characterizing an attack; forensics and evidence collection; understanding the technical issues of different attack types; and performing analysis and response tasks for various types of incidents. The course also outlines how to build and manage computer incident
Operating Systems & Applications Security (Track Core)
Security in Wireless Ad Hoc Networks
The course covers security measures for different types of wireless networks, the challenges associated with securing ad hoc networks, the different attacks on Ad hoc networks, the different types of intrusion detection systems used for ad hoc networks, the reputation systems as an approach to securing ad hoc networks. Upon completing the course the students will be able to describe the different