Skip to main content

ICS 685 Cyberspace Security Engineering II

This course will be the second of a two-course series that introduces the interdisciplinary field of cyberspace security. The technical foundation for the cybersecurity defender is a particular combination of network, operating system, hardware (mobile, desktop, and server) and software engineering skills, all of which are required to protect and defend modern systems, networks and information assets. Students will explore in-depth technical foundations which underpin cybersecurity threats and corresponding defenses. Through hands-on training using Cyber Range students will gain necessary skills to begin supporting and implementing cyberspace security. This course will cover the following topics: Identity and Access Management (Physical and logical assets control, authentication, access control attacks, and access provisioning lifecycle), Security Assessment and Testing (Assessment and test strategies, security process data, and security control testing), Security Operations (Investigations, incident management, and disaster recovery, logging and monitoring, patch management and recovery strategies), and Software Development Security (understanding, applying, and enforcing software security, security in the software development lifecycle, and development environment security controls).

Prerequisites

Special information

First day attendance is mandatory.
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Graduate credits

Effective January 9, 2017 to present

Learning outcomes

General

  • Manage identification, authentication, and authorization of people and devices and implement the related technologies
  • Use the principles of assurance and trust integrate assurance into software system requirements and designs.
  • Demonstrate expertise in reading peer-reviewed papers in cyberspace security, and explain them in writing.
  • Create and manipulate Access Control Matrices (ACMs), and use the theory of ACMs to demonstrate results related to the basic concepts
  • Design and validate security assessment and test strategies
  • Collect and analyze security process data and produce quality reports for different audiences.
  • Understand and apply foundational security operations concepts
  • Employ resources resource protection techniques and understand secure provisioning of these resources.
  • Conduct incident management, logging, and monitoring activities.
  • Understand requirements for investigation types and support investigations.
  • Understand and apply security in the software development life cycle and enforce security controls in development environment