Cybersecurity Courses
The Florida Institute for Cybersecurity (FICS) Research is focused on development of cybersecurity science and innovative technologies that transform the design and security assessment of large and small enterprises, and critical applications such as power grid systems, financial systems, military systems, and more. Our education program includes seminar series, tutorials, short courses, and certificates. They provide learning opportunities for graduate, undergraduate, and even high school students in cybersecurity.
FICS Research’s goals are to:
- Engage with high school students and their teachers in the field of security and privacy.
- Provide unique learning opportunities for large and small enterprises to better understand cybersecurity challenges through online courses.
- Engage with under-represented undergraduate students and provide them with opportunities to study at the graduate level.
- Develop educational tools and modules for teaching courses on various topics in cybersecurity.
FICS Research faculty offers a variety of courses on cybersecurity, namely:
CourseNumber | CourseTitle | Credits | Fall | Spring |
---|---|---|---|---|
EEE4714 / EEE5716 | Introduction to Hardware Security and Trust. * | 3 | ✓ | |
EEL4853 / EEL5855 | Cross Layered System Security | 3 | ✓ | |
EEL5934-1265 | Hardware Security Lab | 3 | ✓ | |
EEL6935-2C33 | Biometric Identification | 3 | ✓ | |
EEE6742 | Advanced Hardware Security and Trust | 3 | ✓ | |
CIS 2354 | Introduction to Cybersecurity | 3 | ✓ | |
CGS 3065 | Legal and Social Issues in Computing | 3 | ✓ | |
CIS4204 | Penetration Testing: Ethical Hacking | 3 | ✓ | |
CIS 4360 | Computer and Information Security | 3 | ✓ | |
CIS 4362 | Introduction to Cryptology | 3 | ✓ | |
CIS 5371 | Introduction to Cryptology | 3 | ✓ | |
CNT 4409 / CNT 5412 | Network and System Security | 3 | ✓ | |
CNT 5410 | Computer and Network Security | 3 | ✓ | |
CIS 5370 | Computer and Information Security | 3 | ✓ | |
CAP 6137 | Malware Reverse Engineering | 3 | ✓ | |
CIS 6930 | Penetration Testing: Ethical Hacking | 3 | ✓ | |
EEL 6935 | Physical Inpection Electronic Systems | 3 | ✓ | |
CIS 6930 | Software Security | 3 | ✓ |
Introduction to Hardware Security and Trust
EEE4714/EEE5716
Fundamentals of hardware security and trust for integrated circuits. Cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG). watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit detection, hardware Trojan detection and prevention in IP cores and integrated circuits.
Download SyllabusCross layered system security
EEL4853/EEL5855
Develop an understanding of the principles of computer systems security (confidentiality, integrity and availability), especially as it crosses layers of abstraction (application layer, operating system, hardware and network). Students will learn challenges of building secure computer systems for each layer of abstraction with examples and study cases. Cutting edge research on these challenges will be discussed. Students will work on hands-on assignments and will read, review and present conference papers.
Download SyllabusHardware Security Lab
EEL 5934
This lab course focuses on the hands-on learning of computer hardware security. The course will follow a distinctive hands-on teaching approach using a well-designed set of experiments as learning tool. Students will be able to “hack” a system at different levels and analyze different countermeasures for major hardware attacks.
Download SyllabusFundamentals of Biometric Identification
EEL6935
Methods and principles for the automatic identification/authentication of individuals. Technologies include fingerprint, face, and iris biometrics. Additional topics include biometric system design, performance evaluation, multi-modal biometric systems, and biometric system security.
Download SyllabusIntroduction to Cybersecurity
CIS2354
Introduces many issues in cybersecurity including ubiquity of processors and communications in modern society, vulnerabilities of computers, networks, data, and embedded systems; privacy, risk management, social engineering, various attacks on computers and networked systems, attacks on user authentication systems. Expect weekly discussion of current topics.
Download SyllabusLegal and Social Issues in Computing
CGS3065
Explores the history, the myth, the ethics, the law and the risks of computer-based technology in modern society. Emphasizes critical analysis of hypotheticals and case studies. Published material is supplemented with online references.
Download SyllabusPenetration Testing: Ethical Hacking
CIS4204/CIS 6930
Introduces principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. Covers planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. Discovers how system vulnerabilities can be exploited and learn to avoid such problems.
Download SyllabusComputer and Information Security
CGS4360
Covers systematic threat and risk assessment; programmed threats and controls in hardware, software, and human procedures; security policies, models, and mechanisms; theoretical limitations and practical implementations; certification and accreditation standards; and case study reviews. Includes projects.
Download SyllabusIntroduction to Cryptology
CGS4362/CIS5371
Introducing classical and modern cryptography and cryptanalysis, including symmetric and asymmetric (public key) ciphers. It covers cryptographic hash functions, block and stream ciphers, as well as differential and linear cryptanalysis. It reviews BAN logic, applications of cryptography, cryptographic standards and protocols, and analyzes case studies of failed implementations.
Download SyllabusNetwork and System Security
CNT4409/CNT5410
Examines networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Includes projects.
Download SyllabusComputer and Information security
CIS5370
Issues, analysis, and solutions. Viruses, worms, logic bombs, network attacks, covert channels, steganography, cryptology, authentication, digital signatures, electronic commerce.
Download SyllabusNetwork and System Security
CNT5412
Examining networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Coursework includes a significant term project.
Download SyllabusMalware Reverse Engineering
CAP6137
Introducing the theory and practice of software reverse engineering applied to analysis of malicious software (malware). Students learn techniques of static and dynamic analysis to help identify the behavior of programs presented without documentation or source code and to identify possible remediation and avoidance techniques.
Download Syllabus