This second course in cyber security explores advanced technological techniques and tools in cybersecurity. Students will use these technologies and skills to identify different categories of threats, and implement corresponding countermeasures. Student will build knowledge of the tools and protocols needed to perform, encryption and authentication of data, operating system and application security, malware operation and analysis, code-level exploits, reverse engineering, security design principles, techniques for reducing complexity, and formal security models. In addition students will gain insight into the legal, social, and political dynamics of the cyber universe. Students will use software and tools they learn in this course to complete a graduate level final project/paper that reflects the skills and tools they learned in the course.
- Students will explain in detail how various encryption and authentication tools work.
- Students will distinguish among different kinds of malware and explain how they function.
- Students will demonstrate how various kinds of security attacks are implemented in code, including buffer overflows, race conditions, and kernel space vulnerabilities.
- Students will use reverse engineering to analyze how malware impacts a system.
- Students will practice various techniques for reducing system complexity and will explain why reducing complexity is important to improving security.
- Students will write formal proofs of a system's security.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.