Courses
Cloud Computing Security
The course investigates deeply the security platforms and architecture associated with different cloud computing deployment models. Students have to examine the concerns, incidents, vulnerabilities, the corresponding security issues due to virtualization and the use of hypervisors and virtual machines. The course has to emphasize on the countermeasures correlated with the virtualized environments
Advanced Applied Cryptography
This course targets building advanced knowledge and experience in the applied domains of cryptography and its future trends and algorithms. The course should span deeply the most popularcryptanalytictechniques.Studentsmustbuildexperienceandgainunderstandingofthe practical and applied aspects ofthe cryptographic engineeringtechniques and algorithms
Advanced Network Security
Network security is one of the ever-evolving domains of research. The course has to go deeply into large scale network attacks and its direct and indirect impacts. Students have to examine in full details the DoS,DDoS,Malware-based attacks,penetration testing methodologies, network monitoring, and bot net detection. The course also targets
Cybercrime Identification and Prevention
In this course, students go deeply into the different digital cyber crime scenes and scenarios; from the criminal and the victim(s) perspectives. The course analyses the vulnerability foundation, traditional causes, system strengths and weaknesses, counter measures, and prevention and protection techniques. Human vulnerabilities, insider threat and
Advanced Digital Forensics and Incident Response
The course covers the necessary capabilities for forensic analysts and incident responders to identify and counter a wide range of threats within enterprise networks, including economic espionage, hacktivism, and financial crime syndicates. The course will consist of in-class presentations,workshopsandinteractivediscussionsaboutresearchpapers.
Advanced Penetration Testing and Ethical Hacking
This advanced course introduces students to the most prominent and powerful attack vectors, allowing students to perform these attacks in a variety of hands-on scenarios. The course includesresearchseminarscoveringfoundationalworkandcurrenttopicsinpenetrationtesting andethicalhacking.Studentswillreadanddiscusspublishedresearchpapersaswellas
Physical Systems Security
The course examines security platforms and concerns related to cyber physical systems with emphasis on the industrial control systems such as SCADA systems. The course explores the industrial cyber security threats, corresponding networking architecture, control systems, design, protocols, and governing modules. Students have to investigate different security threats to different cyber-physical
Advanced Operating Systems Security
Thiscourseexaminesindepththeoperatingsystems’structuring,designandimplementationconcepts.It emphasizes on the possible attack scenarios and vulnerabilities in distributed systems, scheduling in parallel systems, grid systems, parallel computing, virtualization, hypervisors and virtual machines, and defense-in-depth concepts in virtualized environment.
Virtualization Security
The course examines the security issues of the classical versus virtualized data centers. Students have to go in depth into the hypervisor architectures, virtual machine construction and specifications, VM status, VM templates, the related security concerns, securing VM to VM traffic, securing hypervisor kernels and VMMs, virtual firewalls, virtualized networking environment, security incidents
Advanced Applications Security and Coding
The course covers securing software design, development and implementation, defense in depth, multi_x0002_tier architecture, attacks to APIs, code vulnerability, data validation, SQL injection, data storage, encryption and decryption, error handling and logging, sessions hijacking, threat modeling and/or threat 54 trees, risk analysis, management, mitigation and countermeasures. The course