Course Objectives: |
This course provides a basic understanding of full spectrum cyber operations, the complexities of the cyberspace environment, as well as the planning, organization and integration of cyberspace operations. The course will consist of presentations and exercises that teach students how to develop and manage a cyber operations design. At the end of the course, students will have a basic understanding of how to analyze, plan and implement cyber operations. |
Course Content: |
This course will provide a basic introduction to all aspects of cybersecurity, including business, policies and procedures, communications security, network security, security management, legal issues, political issues, and technical issues. This means having the cybersecurity foundation in the Cyber Security section. |
Week |
Subject |
Related Preparation |
1) |
Cyber Security Overview |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
2) |
Access control |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
3) |
Telecommunications and Network Security |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
4) |
Telecommunications and Network Security |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
5) |
Software Development Security |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
6) |
Cryptography |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
7) |
Operational Security |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
8) |
Midterm |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
9) |
Security Architecture and Design |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
10) |
Business Continuity and Disaster Recovery Planning |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
11) |
Legal, Regulations, Investigations and Forensics |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
12) |
Physical (Environmental) Security |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
13) |
Emerging Technologies |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |
14) |
Compromise of Security Programs |
A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup. |