Mathematics & Computer Science: Information Security Courses

Lauren Thorne/Roote

Photo of Lauren Thorne/Roote
Class of 2013

I currently work at Scranton Preparatory School as an algebra and geometry teacher. My college math courses made me aware of the bigger picture in mathematics. They helped me to not only grasp each individual subject on a higher level, but also to understand their connection to one another so I can convey their practical relationships and importance in the greater field of mathematics to my high school students.

see more »

Information Security Courses

INSC 410/510 Legal Issues in Information Security (3)

This course is an introduction to the legal and regulatory issues in the field of information security. Federal laws and regulations, including OMB and NIST standards, are examined. Moral and ethical issues for professionals in the field are also considered.

INSC 420/520 Introduction to Computer Security (3)

This course is an introduction to the fundamental principles and common practices of computer and information security. It provides an overview of such topics as cryptography, network intrusion and detection, software and operating system security, VPN etc. Prerequisite: CS 242, CS 322

INSC 430/530 Network Security (3)

The course is an introduction to the field of network security. The course covers network security services such as authentication and access control, integrity and confidentiality of data, firewalls and related technologies, Web security and privacy. Prerequisite: CS 322

INSC 440/540 Introduction to Cryptography (3)

This course is an introduction to the theory and practice in the field of cryptography. Topics include classic and modern ciphers (DES, AES, RSA etc.), digital signature, message digest, key exchange protocols, and PKI. Prerequisite: CS 150, MATH 323

INSC 445/545 Security Policies and Implementations (3)

This course provides an overview of the best practices of developing and implementing effective organizational policies and programs on information security. Topics include privacy, contingency response, infrastructure reliability, risk assessment and management, and organizational roles and responsibilities.

INSC 450/550 Digital Forensics (3)

This course introduces students to the field of digital forensics and it will focus on the contemporary policy issues and applied technologies. Topics to be covered include: legal and regulatory issues, investigation techniques, data analysis approaches, and incident response procedures for Windows and UNIX systems. Prerequisite: CS 242, CS 245

INSC 560 Applied Cryptography and Secure Communication (3)

This course studies real world cryptographic systems and examines their strength and weaknesses. Some commonly deployed cryptosystems will be used as examples in this course. Prerequisite: INSC 440/540

INSC 565 Operating Systems Security (3)

This course covers the fundamental theory and practice in Operating System security. OS level security architectures and mechanisms will be studied. Topics include OS level security architectures and mechanism, OS security policies, and basic OS security techniques. Prerequisite: CS 344

INSC 590 Special Topics in Information Security (3)

Special topics that are not available in other courses may be covered when there is enough interest among students and faculty.

INSC 620 Cloud Computing Security (3)

This course investigates the security issues related to cloud computing, such as confidentiality, integrity, and availability of data and computations. Practical applications of secure cloud computing will be explored, current research publications will be the focus of this course. Prerequisite: INSC 420/520

INSC 630 Data Protection and Recovery (3)

In this course, students will study computer file storage systems, with the focus on data protection and recovery. Topics include data backups, diversification, RAID systems, disaster response and recovery etc. Prerequisite: INSC 420/520

INSC 640 Mobile System Security (3)

This course will investigate security issues in mobile systems. When devices such as smart phones and tablets are carrying more and more personal as well as business data, security threats from mobile systems must be dealt with by developing consistent security policies and implementing effective security programs across all platforms. Both policy and technical considerations will be covered in this course. Prerequisite: INSC 420/520

INSC 650 Corporate Information Security (3)

This course examines information security in the corporate environment. Common sources of security threats are identified and addressed. Technological, human behavioral, and policy solutions are considered. Further topics include incident response, legal issues, and public relations. Prerequisite: INSC 410/510