Cybersecurity Courses


The Florida Institute for Cybersecurity (FICS) Research is focused on development of cybersecurity science and innovative technologies that transform the design and security assessment of large and small enterprises, and critical applications such as power grid systems, financial systems, military systems, and more. Our education program includes seminar series, tutorials, short courses, and certificates. They provide learning opportunities for graduate, undergraduate, and even high school students in cybersecurity.

FICS Research’s goals are to:

  1. Engage with high school students and their teachers in the field of security and privacy.
  2. Provide unique learning opportunities for large and small enterprises to better understand cybersecurity challenges through online courses.
  3. Engage with under-represented undergraduate students and provide them with opportunities to study at the graduate level.
  4. Develop educational tools and modules for teaching courses on various topics in cybersecurity.

FICS Research faculty offers a variety of courses on cybersecurity, namely:

CourseNumberCourseTitleCreditsFallSpring
EEE4714 / EEE5716Introduction to Hardware Security and Trust. *3
EEL4853 / EEL5855Cross Layered System Security3
EEL5934-1265Hardware Security Lab3
EEL6935-2C33Biometric Identification3
EEE6742Advanced Hardware Security and Trust3
CIS 2354Introduction to Cybersecurity3
CGS 3065Legal and Social Issues in Computing3
CIS4204Penetration Testing: Ethical Hacking3
CIS 4360Computer and Information Security3
CIS 4362Introduction to Cryptology3
CIS 5371Introduction to Cryptology3
CNT 4409 / CNT 5412Network and System Security3
CNT 5410Computer and Network Security3
CIS 5370Computer and Information Security3
CAP 6137Malware Reverse Engineering3
CIS 6930Penetration Testing: Ethical Hacking3
EEL 6935Physical Inpection Electronic Systems3
CIS 6930Software Security3
Spring
Introduction to Hardware Security and Trust

EEE4714/EEE5716

Fundamentals of hardware security and trust for integrated circuits. Cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG). watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit detection, hardware Trojan detection and prevention in IP cores and integrated circuits.

Download Syllabus
Spring
Cross layered system security

EEL4853/EEL5855

Develop an understanding of the principles of computer systems security (confidentiality, integrity and availability), especially as it crosses layers of abstraction (application layer, operating system, hardware and network). Students will learn challenges of building secure computer systems for each layer of abstraction with examples and study cases. Cutting edge research on these challenges will be discussed. Students will work on hands-on assignments and will read, review and present conference papers.

Download Syllabus
Fall
Hardware Security Lab

EEL 5934

This lab course focuses on the hands-on learning of computer hardware security. The course will follow a distinctive hands-on teaching approach using a well-designed set of experiments as learning tool. Students will be able to “hack” a system at different levels and analyze different countermeasures for major hardware attacks.

Download Syllabus
Spring
Fundamentals of Biometric Identification

EEL6935

Methods and principles for the automatic identification/authentication of individuals. Technologies include fingerprint, face, and iris biometrics. Additional topics include biometric system design, performance evaluation, multi-modal biometric systems, and biometric system security.

Download Syllabus
Spring
Introduction to Cybersecurity

CIS2354

Introduces many issues in cybersecurity including ubiquity of processors and communications in modern society, vulnerabilities of computers, networks, data, and embedded systems; privacy, risk management, social engineering, various attacks on computers and networked systems, attacks on user authentication systems. Expect weekly discussion of current topics.

Download Syllabus
Spring
Legal and Social Issues in Computing

CGS3065

Explores the history, the myth, the ethics, the law and the risks of computer-based technology in modern society. Emphasizes critical analysis of hypotheticals and case studies. Published material is supplemented with online references.

Download Syllabus
Fall
Penetration Testing: Ethical Hacking

CIS4204/CIS 6930

Introduces principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. Covers planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. Discovers how system vulnerabilities can be exploited and learn to avoid such problems.

Download Syllabus
Fall
Computer and Information Security

CGS4360

Covers systematic threat and risk assessment; programmed threats and controls in hardware, software, and human procedures; security policies, models, and mechanisms; theoretical limitations and practical implementations; certification and accreditation standards; and case study reviews. Includes projects.

Download Syllabus
Spring
Introduction to Cryptology

CGS4362/CIS5371

Introducing classical and modern cryptography and cryptanalysis, including symmetric and asymmetric (public key) ciphers. It covers cryptographic hash functions, block and stream ciphers, as well as differential and linear cryptanalysis. It reviews BAN logic, applications of cryptography, cryptographic standards and protocols, and analyzes case studies of failed implementations.

Download Syllabus
Fall
Network and System Security

CNT4409/CNT5410

Examines networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Includes projects.

Download Syllabus
Spring
Computer and Information security

CIS5370

Issues, analysis, and solutions. Viruses, worms, logic bombs, network attacks, covert channels, steganography, cryptology, authentication, digital signatures, electronic commerce.

Download Syllabus
Fall
Network and System Security

CNT5412

Examining networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Coursework includes a significant term project.

Download Syllabus
Spring
Malware Reverse Engineering

CAP6137

Introducing the theory and practice of software reverse engineering applied to analysis of malicious software (malware). Students learn techniques of static and dynamic analysis to help identify the behavior of programs presented without documentation or source code and to identify possible remediation and avoidance techniques.

Download Syllabus