Teaching
Current Courses
This course is intended to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet for corporate networks, and on standards that have been widely deployed. Syllabus |
The objective of this course is to familiarize students with the practice of performing reverse engineering on suspicious files and firmware by utilizing static and dynamic techniques and procedures. Syllabus |
The goal of the course is to teach the introductory concepts and principles in telecommunication networks, especially Internet, and how to apply those concepts in network system engineering synthesis, analysis, and evaluation of computer communication networks. Syllabus |
This course is intended to provide students with the security aspects that are associated with various types of networks. It provides an introduction to the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The course covers new topics in network security as well, including psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. Syllabus |
Graphical user interface (GUI) for embedded system included elements and style, events, component and object oriented user interface models, and graphical application programming issues. Syllabus |
This course is intended to provide a practical understanding of embedded operating systems. The emphasis is on the hardware and software aspects of embedded computing encompassing the composition of the embedded operating system and the development of embedded systems. It also provides students with the knowledge and skills to begin developing and implementing device drivers and embedded applications with the practical aspects of embedded computing. Syllabus |
The objective of this course is to familiarize students with the practice of performing reverse engineeringon suspicious files and firmware by utilizing static and dynamic techniques and procedures. The student will gain an understanding of how malware behavior can be used to train machine learning classifiers to detect malicious software. Analytical information such as environment changes (file, system, network, and process), communication with the rest of the network and the malware’s impact on system will be closely observed and analyzed for actionable information. Syllabus |
This course is intended to provide a practical and research aspects of tools and techniques used to compromise computing systems and networks. Syllabus |
Past Taught Courses
This course will give a fundamental foundation for students new to the digital forensics field, discussing, what digital forensics is, the methodologies used, key technical concepts, and the tools needed to perform examinations and media exploitation techniques. Students will examine various log files, and storage mediums associated with computers, and different operating systems including Windows and Linux. Syllabus |
This is a course designed as a graduate-level course which covers an introduction to digital forensics with a research perspective. The course will cover the fundamentals of the computer and network forensics and media exploitation techniques and introduces students to computer forensic software and hardware tools. Syllabus |
Additional Courses
Cybersecurity is not just a technical problem as it occurs in the context of humans and human society. CIS 5208, graduate level course will explore the implications of the cybersecurity in a much broader sense, including social, economic and legal aspects: for example, transformation of traditional expectations of privacy due to social networking and digital surveillance. Conversely, we will also explore how human factors affect cybersecurity in terms of usability of the technology, user psychology and social engineering threats. Syllabus |
This course offers an introduction to virtual private networks (VPNs) and firewalls for securing a network. Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall Syllabus |