top of page

cryptography

This course focuses on classical encryption techniques, block ciphers (e.g. DES), stream ciphers, Confidentiality with symmetric encryption (e.g AES), Finite fields and number theory, public key cryptography (e.g. RSA), Diffie-Hellman key exchange algorithm, public key approaches based on elliptic curves, message authentication codes (MAC), cryptographic hash functions, digital signatures and authentication protocols, quantum key cryptography and ID based cryptography. Use of embedded security features of Windows and Browsers such as  Transport Layer Security (SSL, TLS) and IP Security.

Network security

Covers the security associated with computer networks. It analyzes network architectures, vulnerabilities, and security mechanisms such as security devices (e.g Firewall), intrusion detection systems, access controls, malware scanners. Follows best NIST practices with the 20 Critical Controls and NIST Design methodology.

security in computers

This course focuses on fundamental aspects of cyber security serving as an introduction to cyber security. Explores the basics behind computer security such as threats, vulnerability, and security control. Introduces security programs (malicious and non-malicious), web security, operating system security, network security, databases security

risk management

Covers the fundamentals of risk analysis, risk management, security policy, legal issues, and secure systems development, risk management standards ( NIST 800-30, NIST 800-39), SANS 20 critical security practices, Incident response methodologies with a look through NIST SP800-61 and SP800-61, Digital forensics examination via NIST SP800-86, Digital forensics using Linux OS based on LEFE guide, Supply chain risk management practices using NIST SP800-161, Policy, legal and ethical implication of security management that addresses HIPAA/ FERPA.

cyber bootcamp

A hands on comprehensive course that combines the concepts covered in all the courses. It allows students to complete a project on a Linux platform with a local area network architecture. One virtual machine will be the attacking device configured with necessary tools to launch attacks whereas a second device will host exploitable OS. Introduction to mainstream cyber security tools such as sniffers, Intrusion Detection, Attack tools, Firewalls, and forensics.

Download the CCI program syllabus 

Download the guide to see all the resources that are available to you with the CC Cybersecurity program.

Contact Us

Thanks for submitting!

bottom of page