Search for a Course
MET CJ 610 Cybercrime
Undergraduate Prerequisites: Previous criminal justice or related course, or consent of instructor. - This course is designed to help students understand and apply the nature of computer crime in the criminal justice field. Several theories (both micro-level and macro-level) will be presented and will be analyzed in depth and applied to computer crime cases both past and present. Students will see how major theories have been re-developed to be applied to computer crime, and by using these theories, students will both develop and explore different strategies for future law enforcement. Students will be presented with common types of fraudulent schemes, as well as several laws that have been enacted and developed specifically for computer crime. In addition, causes, victimization, legal issues, control strategies, and societal costs regarding the "computer-crime" problem will be explored and evaluated. [ 4 cr. ]
MET CJ 620 Cyberterrorism and Cyber Defense
Cyber-terrorists continuously leverage sophisticated techniques in efforts to attack the nation's critical infrastructures by damaging their functionalities and stealing highly sensitive intellectual property, private information, and valuable assets. This course is designed to explore a new explanatory angle for studying cyberterrorism issues from a cyber- intelligence perspective. Major cyberterrorism cases will be empirically analyzed and applied into a lab environment for gaining hands-on-experience and to develop defensive strategies and counter measures. This course aims to examine three main types of cyberterrorism 1) Information Attacks, 2) Infrastructure Attacks, and 3) Technology Facilitation for building both technical capability and a set of policy recommendations to counter these potential threats. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
O2 | IND | Choi | ARR | 12:00 am – 12:00 am |
MET CJ 710 Applied Digital Forensic Investigation
This course is designed to engage students for conducting successful forensic examinations of digital devices and computer networks with hands-on-experience within the Virtual Security Lab. The course introduces EnCase forensic software, which has received the high acceptance rate in a court of law as an expert witness. The course aims to cover various cybercrime topics and digital forensic investigation practices using digital evidence samples. In the process of learning, students will explore the nature of specific cybercrime and be able to successfully analyze and document the digital evidence related to the crime. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Choi | MUG 205 | T | 6:00 pm – 8:45 pm |
O1 | IND | Nay | ARR | 12:00 am – 12:00 am |
MET CJ 812 Cybersecurity Capstone
在
MET CS 546 Introduction to Probability and Statistics
联合国
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Gorlin | CAS 226 | M | 6:00 pm – 8:45 pm |
A2 | IND | Gorlin | CAS 213 | T | 6:00 pm – 8:45 pm |
O1 | IND | Temkin | ARR | 12:00 am – 12:00 am | |
O2 | IND | Temkin | ARR | 12:00 am – 12:00 am |
MET CS 599 Biometrics
In this course we will study the fundamental and design applications of various biometric systems based on fingerprints, voice, face, hand geometry, palm print, iris, retina, and other modalities. Multimodal biometric systems that use two or more of the above characteristics will be discussed. Biometric system performance and issues related to the security and privacy aspects of these systems will also be addressed. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Djordjevic | PHO 201 | W | 6:00 pm – 8:45 pm |
MET CS 625 Business Data Communication and Networks
Undergraduate Prerequisites: On Campus Prerequisites: MET CS 200 Fundamentals of Information Techno logy. Or instructor^s consent. ; Undergraduate Corequisites: Restrictions: MS CIS only. This course may not be taken in conjunction with CS 425 (undergraduate) or CS 535. Only CS 535 or CS 625 can be c ounted towards degree requirements. - This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. Prereq: MET CS 200, or instructor's consent. This course may not be taken in conjunction with MET CS 425 (undergraduate) or MET CS 535. Only one of these courses can be counted towards degree requirements. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Arena | CGS 123 | T | 12:30 pm – 3:15 pm |
A2 | IND | Arena | FLR 121 | T | 6:00 pm – 8:45 pm |
O1 | IND | Rizinski | ARR | 12:00 am – 12:00 am | |
O2 | IND | Rizinski | ARR | 12:00 am – 12:00 am |
MET CS 674 Database Security
Graduate Prerequisites: CS 579 or CS 669 or consent of the instructor - The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. Prereq: MET CS 579 or MET CS 669; or instructor's consent. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
O2 | IND | Carroll | ARR | 12:00 am – 12:00 am |
MET CS 684 Enterprise Cybersecurity Management
Th
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Mukavetz | CAS 426 | M | 6:00 pm – 8:45 pm |
E1 | IND | Mukavetz | CAS 426 | M | 6:00 pm – 8:45 pm |
MET CS 690 Network Security
联合国
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Zhang | WED 140 | R | 6:00 pm – 8:45 pm |
O1 | IND | Zhang | ARR | 12:00 am – 12:00 am |
MET CS 693 Digital Forensics and Investigations
公关
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
E1 | IND | Arena | MET 101 | S | 9:00 am – 12:00 pm |
O2 | IND | Navarro | ARR | 12:00 am – 12:00 am |
MET CS 694 Mobile Forensics and Security
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Zhang | MCS B33 | R | 6:00 pm – 8:45 pm |
MET CS 695 Cybersecurity
Undergraduate Prerequisites: (METCS625) or instructor's consent - This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Arena | MCS B29 | M | 6:00 pm – 8:45 pm |
O1 | IND | See | ARR | 12:00 am – 12:00 am |
MET CS 703 Network Forensics
Undergraduate Prerequisites: (METCS625 & METCS695) or instructor^s consent. - This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students understand the relationship between network forensic analysis and network security technologies. Students will learn to identify network security incidents and potential sources of digital evidence and demonstrate the ability to perform basic network data acquisition and analysis using computer based applications and utilities. Students will also identify potential applications for the integration of network forensic technologies and demonstrate the ability to accurately document network forensic processes and analysis. Prereq: MET CS 625 and MET CS 695; or instructor's consent. [ 4 cr. ]
MET CS 763 Secure Software Development
Graduate Prerequisites: MET TC 250 or MET CS 248 or MET OM 501. - Overview of techniques and tools to develop secure software. Focus on the application security. Topics include secure software development processes, threat modeling, secure requirements and architectures, vulnerability and malware analysis using static code analysis and dynamic analysis tools, vulnerabilities in C/C and Java programs, Crypto and secure APIs, vulnerabilities in web applications and mobile applications, and security testing. Hands-on lab and programming exercises using current tools are provided and required. Prerequisite: At least two 500- level (or above) programming-intensive computer science courses; or instructor's consent. [ 4 cr. ]
Section | Type | Instructor | Location | Days | Times |
---|---|---|---|---|---|
A1 | IND | Zhang | FLR 123 | T | 6:00 pm – 8:45 pm |
MET CS 789 Cryptography
Graduate Prerequisites: (METCS248 & METCS566) or consent of the instructor - The course covers the main concepts and principles of cryptography with the main emphasis put on public key cryptography. It begins with the review of integers and a thorough coverage of the fundamentals of finite group theory followed by the RSA and ElGamal ciphers. Primitive roots in cyclic groups and the discrete log problem are discussed. Baby-step Giant-step and the Index Calculus probabilistic algorithms to compute discrete logs in cyclic groups are presented. Naor -- Reingold and Blum -- Blum -- Shub Random Number Generators as well as Fermat, Euler and Miller-Rabin primality tests are thoroughly covered. Pollard's Rho, Pollard's and Quadratic Sieve factorization algorithms are presented. The course ends with the coverage of some oblivious transfer protocols and zero-knowledge proofs. There are numerous programming assignments in the course. Prereq: MET CS 248, or instructor's consent. [ 4 cr. ]
MET CS 793 Special Topics in Computer Science
Fall 2023 Topic: Generative AI
This course focuses on recent advances in generative AI. It starts by reviewing statistics and regression models related to generative models, then common deep learning methods described. Later, models for designing new content, such as images, music, or text, will be explored, including GAN, VAE, Autoregressive and Diffusion Models. MLP, CNN, RNN, and Transformer models covered in CS 767 are reviewed. Students should be fluent in Python programming and CS 555 and CS 677 [ 4 cr. ]
MET CS 799 Advanced Cryptography
Undergraduate Prerequisites: (METCS789) or instructor's consent - This course builds on the material covered in CS 789 Cryptography. It begins with the coverage of commutative rings, finite fields, rings of polynomials, and finding of the greatest common divisor in the ring of polynomials. Irreducible polynomials are discussed. Field extensions and fields Fᴩ [x]/P are thoroughly covered. The main emphasis is put on elliptic curves over Fᴩ and F₂ and the ElGamal cipher on elliptic curves is presented. Block ciphers DES and double and triple DES are introduced. AES and WHIRLPOOL block ciphers and modes of operation are covered. The course continues with the introduction of message integrity and message authentication. In the last part of the course cryptographic hash functions SHA-512 and WHIRLPOOL as well as various digital signatures are introduced. Finally, entity authentication and key management issues are discussed. Prereq: MET CS 789; or instructor's consent. [ 4 cr. ]