Course Curriculum

    CYS01
    Introduction to Operating Systems
    • Threads, processes, concurrency, memory
      management, I/O Control and case studies
    Term1
    24 Hours
    CYS02
    Computer Networking
    • Application layer - client-server architectures, P2P architectures, DNS and HTTP and Web applications.
    • Transport layer - multiplexing, connectionless transport and UDP, principles or reliable data transfer, connection-oriented transport and TCP and TCP congestion control.
    • Network layer - forwarding, router architecture, the IP protocol and routing protocols including OSPF and BGP
    • Link layers - multiple-access protocols, ALOHA, CSMA/CD, Ethernet, CSMA/CA, wireless 802.11 networks and linklayer switches.
    • Simple quantitative delay and throughput modeling, socket programming and network application development and Ethereal labs
    Term 1
    24 Hours
    CYS03
    Design and Analysis of Algorithms
    • Data structures, priority queues, binary search trees, balanced search trees. Btrees.
    • Algorithm design and analysis techniques illustrated in searching and sorting
    • Design and analysis techniques: dynamic programming, greedy algorithms.
    • Graph algorithms: elementary graph algorithms (breadth first search, depth first search, topological sort,
      connected components, strongly connected components
    Term1
    120 Hours
    CYS03
Information Security and Privacy
    • Information Systems Security and covers cryptography, capability and access control mechanisms, authentication models, security models, operating systems security, malicious code, security-policy formation and enforcement, vulnerability analysis, evaluating secure systems.
    Term1
    120 Hours
    CYS04
    Network Security
    • Attacks and threats in computer networks, including network mapping, port scanning, sniffing, DoS, DDoS, reflection attacks, attacks on DNS and leveraging P2P deployments for attacks.
    • Cryptography topics most relevant to secure networking protocols: block ciphers, stream ciphers, public key cryptography, RSA, Diffie Hellman, certification authorities, digital signatures and message integrity.
    • Secure networking protocols, including PGP, SSL, IPsec and wireless security protocols.
    • The course examines operational security, including firewalls and intrusion-detection systems.
    • Lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.
    Term2
    60 Hours
    CYS05
    Applied Cryptography
    • Modern Cryptography from a both theoretical and applied perspective, with emphasis on “provable security” and “application case studies”.
    • Cryptographic primitives that are building blocks of various cryptographic applications.
    • Notions of security for a given cryptographic primitive, its various constructions and respective security analysis based on the security notion
    • Pseudorandom functions, symmetric encryption (block ciphers), hash functions and random oracles,
      message authentication codes, asymmetric encryption, digital signatures and authenticated key exchange.
    • Secure cryptographic protocols(e.g., secure message transmission, identification schemes, secure function evaluation, etc.)
    • Number-theoretic assumptions upon which cryptography is based.Also covered: implementation issues (e.g., key lengths, key management, standards, etc.)
    Term2
    48 Hours
    CYS06
    Application Security
    • Design and implementation of secure applications.
      Concentration is on writing software programs that make it difficult for intruders to exploit security holes
    • Writing secure distributed programs in Java. The security ramifications of class, field and method visibility are emphasized.
    Term2
    60 Hours
    CYS07
    Advanced Design and Analysis of Algorithms
    • Techniques in advanced design and analysis - Amortized analysis of algorithms
    • Advanced data structures - binomial heaps, Fibonacci heaps, data structures for disjoint sets,analysis of union by rank with path compression
    • Graph algorithms - Elementary graph algorithms, maximum flow, matching algorithms
    • Randomized algorithms - Theory of NPcompleteness and approach to finding (approximate) solutions to NPcomplete problems.
    Term2
    60 Hours
    CYS08
    Penetration Testing and Vulnerability Analysis
    • Computer and network security focuses on penetration testing and vulnerability analysis
    • Methodologies, techniques and tools to analyze and identify vulnerabilities in stand-alone and networked applications.
    Term3&4
    500 Hours
    CYS09
    Security Engineering and Management
    • A system and management view of information security
    • Integration of security into the systems-design process and life-cycle security management of information systems
    • Government information security and methodologies
    • Information-security risk management, security policies,security in the systems-engineering process, laws related to information security and management of operational systems.
    CYS10
    Digital Forensics and Biometrics
    • Information-technology professionals to the application of forensic science principles
      and practices for collecting, preserving, examining, analyzing and presenting digital evidence.