Cyber Security and Operations Courses
Under construction. See the NPS Academic Catalog for more detailed descriptions of each course.
CS3600: Introduction to Information Assurance: Computer Security (4-2)
Covers technical overview of terminology and concepts associated with the field of Information Assurance.
CS3606: An Introduction to Information System Security (4-0)
This Web-based DL class covers basic overview of terminology and concepts associated with the field of Information Assurance.
CS3610: Information Ethics (4-0)
Covers ethical analysis and decision-making in the context of information technology.
CS3640: Analysis of DoD Critical Infrastructure Protection (3-1)
Covers the DoD perspective on protecting critical infrastructures, including both cyber and physical systems.
CS3670: Information Assurance: Secure Management of Systems (3-2)
Covers management concerns associated with computer-based information systems.
CS3686: Identity Management Infrastructure (3-0)
This course covers a broad range of topics related to the standards, protocols, technology, and management infrastructure necessary to field an enterprise-level identity management (IdM) solution.
CS3690: Network Security (4-2)
Covers a broad range of topics in security for networked and internetworked computer systems.
CS3695: Network Vulnerability Assessment and Risk Mitigation (3-2)
Covers network system vulnerabilities and the related mitigating techniques.
CS3699: Biometrics (3-0)
This course reviews the technical details of biometric identification and verification.
CS4600: Secure Systems (3-2)
Covers implementation of protection for monolithic and distributed secure computer systems.
CS4603: Database Security (3-1)
Covers access control implementations associated with database security.
CS4605: Security Policies, Models, and Formal Methods (3-1)
Covers methods used to specify, model, and verify computational systems providing access control.
CS4614: Advanced Topics in Computer Security (3-1)
Covers topics in software, communications, and data security.
CS4615: Formal Analysis of Cryptographic Protocols (3-1)
CS4650: Fundamentals of Information Systems Security Engineering (3-1)
Covers the concepts and techniques that are needed to systematically elicit, derive and validate security requirements.
CS4652: Applied Information Systems Security Engineering (3-2)
Covers the standards, processes and regulatory compliance requirements that are necessary to design, implement and test new secure systems.
CS4675: Intrusion Detection and Response (3-1)
Introduction to methods of intrusion detection in computer systems and networks and the possible methods of automatic response.
CS4677: Computer Forensics (3-2)
Covers the fundamentals of computer forensics as it might be used in the context of DoN/DoD activities.
CS4678: Advanced Vulnerability Assessment (4-2)
Provides a basis for understanding the potential vulnerabilities in networks systems by applying a problem-solving approach to obtaining information about a remote network.
CS4680: Introduction to Certification and Accreditation (3-2)
Covers the C&A process as applied to DoD and Federal information systems.