Cybersecurity Courses

The Florida Institute for Cybersecurity (FICS) Research is focused on development of cybersecurity science and innovative technologies that transform the design and security assessment of large and small enterprises, and critical applications such as power grid systems, financial systems, military systems, and more. Our education program includes seminar series, tutorials, short courses, and certificates. They provide learning opportunities for graduate, undergraduate, and even high school students in cybersecurity.

FICS Research’s goals are to:

  1. Engage with high school students and their teachers in the field of security and privacy.
  2. Provide unique learning opportunities for large and small enterprises to better understand cybersecurity challenges through online courses.
  3. Engage with under-represented undergraduate students and provide them with opportunities to study at the graduate level.
  4. Develop educational tools and modules for teaching courses on various topics in cybersecurity.

FICS Research faculty offers a variety of courses on cybersecurity, namely:

Course Number Course Title CreditsFallSpring
EEL4930-047E Introduction to Hardware Security and Trust. *3
EEL5934-0634Introduction to Hardware Security and Trust. *3
EEL4930 Cross Layered system Security3
EEL5934-047E Cross Layered System Security3
EEL5934-1265 Hardware Security Lab3
EEL6935-2C33Biometric Identification 3
EEL6935-1500 Advanced Hardware Security and Trust3
CIS 2354 Introduction to Cybersecurity 3
CGS 3065 Legal and Social Issues in Computing3
CIS 4204 Penetration Testing: Ethical Hacking3
CIS 4360 Computer and Information Security 3
CIS 4362 Introduction to Cryptology 3
CNT 4409Network and System Security3
CNT 5410Computer and Network Security3
CIS 5370Computer and Information Security3
CIS 5371Introduction to Cryptology3
CNT 5412Network and System Security3
CAP 6137Malware Reverse Engineering3
CIS 6930Penetration Testing: Ethical Hacking3
* Edge courses.

EEL4930-047E/EEL5934-0634: Introduction to Hardware Security and Trust

Fundamentals of hardware security and trust for integrated circuits. Cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG). watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit detection, hardware Trojan detection and prevention in IP cores and integrated circuits. Lecture. Credits 3.

Download syllabus

EEL4930/EEL5934-047E: Cross layered system security

Develop an understanding of the principles of computer systems security (confidentiality, integrity and availability), especially as it crosses layers of abstraction (application layer, operating system, hardware and network). Students will learn challenges of building secure computer systems for each layer of abstraction with examples and study cases. Cutting edge research on these challenges will be discussed. Students will work on hands-on assignments and will read, review and present conference papers.

Download syllabus

EEL4930/EEL5934-047E: Cross layered system security

Develop an understanding of the principles of computer systems security (confidentiality, integrity and availability), especially as it crosses layers of abstraction (application layer, operating system, hardware and network). Students will learn challenges of building secure computer systems for each layer of abstraction with examples and study cases. Cutting edge research on these challenges will be discussed. Students will work on hands-on assignments and will read, review and present conference papers.

Download syllabus

EEL 5934-1265: Hardware security lab

Prerequisite: EEL4930/EEL5934: Intro to Hardware Security and Trust (Spring)

This lab course focuses on the hands-on learning of computer hardware security. The course will follow a
distinctive hands-on teaching approach using a well-designed set of experiments as learning tool. Students will
be able to “hack” a system at different levels and analyze different countermeasures for major hardware attacks.

EEL6935: Fundamentals of Biometric Identification

Methods and principles for the automatic identification/authentication of individuals.
Technologies include fingerprint, face, and iris biometrics. Additional topics include
biometric system design, performance evaluation, multi-modal biometric systems,
and biometric system security.

Download syllabus

CIS 2354: Introduction to Cybersecurity

Introduces many issues in cybersecurity including ubiquity of processors and communications in modern society, vulnerabilities of computers, networks, data, and embedded systems; privacy, risk management, social engineering, various attacks on computers and networked systems, attacks on user authentication systems. Expect weekly discussion of current topics.

CGS 3065: Legal and Social Issues in Computing

Prereq: previous experience in Unix environment.
Explores the history, the myth, the ethics, the law and the risks of computer-based technology in modern society. Emphasizes critical analysis of hypotheticals and case studies. Published material is supplemented with online references.

CIS 4204/ CIS 6930:Penetration Testing: Ethical Hacking

Prereq: COP 3530.
Introduces principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. Covers planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. Discovers how system vulnerabilities can be exploited and learn to avoid such problems.

CGS 4360:Computer and Information Security

Prereq: COP 4600 or equivalent.
Covers systematic threat and risk assessment; programmed threats and controls in hardware, software, and human procedures; security policies, models, and mechanisms; theoretical limitations and practical implementations; certification and accreditation standards; and case study reviews. Includes projects.

CGS 4362:Introduction to Cryptology

Prereq: COT 3100 or the equivalent.
Introduces classical and modern cryptography and cryptanalysis, including symmetric and asymmetric (public key) ciphers. Covers cryptographic hash functions, block and stream ciphers, as well as differential and linear cryptanalysis. Reviews applications of cryptography, cryptographic standards and protocols, and analyzes case studies of failed implementations.

CNT 4409:Network and System Security

Prereq: CNT 4007C and COP 4600 or equivalent.
Examines networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Includes projects.

CNT 5410:Network and System Security

Prerequisite: COP 3530, COT 5405.

Corequisite: COP 4600.

Issues, analysis, and solutions. Viruses, worms, logic bombs, network attacks, covert channels, steganography, cryptology, authentication, digital signatures, electronic commerce.

CIS 5370:Computer and Information security

Prerequisite: COP 3530, COT 5405.

Corequisite: COP 4600.

Issues, analysis, and solutions. Viruses, worms, logic bombs, network attacks, covert channels, steganography, cryptology, authentication, digital signatures, electronic commerce.

CIS 5371:Introduction to Cryptology

Prerequisite: COT 3100 Applications of Discrete Structures or equivalent

Corequisite: COT 5405 Analysis of Algorithms or equivalent

Introducing classical and modern cryptography and cryptanalysis, including symmetric and asymmetric (public key) ciphers. It covers cryptographic hash functions, block and stream ciphers, as well as differential and linear cryptanalysis. It reviews BAN logic, applications of cryptography, cryptographic standards and protocols, and analyzes case studies of failed implementations.

CNT 5412:Network and system security

Prerequisite: CNT 5106C: Computer Networks or equivalent; COP 4600 – Operating Systems or equivalent

Corequisite: COT 5405: Analysis of Algorithms or equivalent.

Examining networked threats and vulnerabilities; trust, identification, authentication, and authorization in networked and distributed systems; secure network protocols and standards; certification of network products; firewall configurations, intrusion detection, and anomaly detection; security flaws in network protocols and distributed applications. Coursework includes a significant term project.

CAP 6137:Malware Reverse Engineering

Prerequisite: CDA 3101

Corequisite: COP 5615 or consent of instructor.

Introducing the theory and practice of software reverse engineering applied to analysis of malicious software (malware). Students learn techniques of static and dynamic analysis to help identify the behavior of programs presented without documentation or source code and to identify possible remediation and avoidance techniques.