The books in the LRC are arranged by topic using Library of Congress classification system. Here are a few call number ranges to explore:
QA 76.9 A25 Computer security
TK 5105.59 Cryptography
For Subject searches using the Worldcat Discover, try:
To do Keyword searches, you can either use add terms or use phrases.
Searching for Information systems management?
Test out information systems AND management or "information systems management" as searches and see what you can find.
The Bachelor of Science in Cybersecurity program focuses on the practical and theoretical aspects of cybersecurity across a range of fundamental areas, such as network security and vulnerability assessment, information security policy and governance, digital forensics, and ethical hacking. It provides students with technical and managerial training in areas that deal with cyber security management, incident response, and security threat assessment which requires them to be creators of knowledge and inventors of processes, not merely users of information.
Graduates of the program will possess a solid grounding in conventional computer, network, and cloud security concepts and skills that are designed to meet the changing landscape of secure computing.
This subject guide gathers in one place carefully evaluated and selected resources on Cybersecurity available and accessible at the CLR and its subscribed databases. Books (both print and electronic) are categorized per course; while journals, magazines, online databases, and industry report are recommended for the entire Cybersecurity program.
QUICK LINKS
Component security deals with the security aspects of the design, procurement, testing, analysis, and maintenance of components integrated into larger systems.
This course will teach you the fundamentals of component security, covering vulnerabilities of system components, the component lifecycle, as well as secure component design principles.
Component security deals with the security aspects of the design, procurement, testing, analysis, and maintenance of components integrated into larger systems.
This course will teach you the fundamentals of component security, covering vulnerabilities of system components, the component lifecycle, as well as secure component design principles.
Cyber Incident Analysis and Response
Cyber incident analysis and response involves the examination of policies and procedures related to security incidents, exposures, and risks and technologies used to respond to such threats.
This course covers basic cyber incident analysis and response strategies, tools and techniques, which include dynamic vulnerability analysis, intrusion detection, attack response, evidence protection, and business continuity.
Cyber Incident Analysis and Response
Cyber incident analysis and response involves the examination of policies and procedures related to security incidents, exposures, and risks and technologies used to respond to such threats.
This course covers basic cyber incident analysis and response strategies, tools and techniques, which include dynamic vulnerability analysis, intrusion detection, attack response, evidence protection, and business continuity.
Network Security Design and Architecture
In this course, students will learn the fundamentals of up-to-date defensible security architecture and how to engineer it. There will be a heavy focus on leveraging current infrastructure (and investment), including switches, routers, and firewalls. Students will learn how to reconfigure these devices to significantly improve their organizations' prevention capabilities in the face of today's dynamic threat landscape.
The course will also delve into the latest technologies and their capabilities, strengths, and weaknesses. You will come away with recommendations and suggestions that will aid in building a robust security infrastructure.
Network Security Design and Architecture
In this course, students will learn the fundamentals of up-to-date defensible security architecture and how to engineer it. There will be a heavy focus on leveraging current infrastructure (and investment), including switches, routers, and firewalls. Students will learn how to reconfigure these devices to significantly improve their organizations' prevention capabilities in the face of today's dynamic threat landscape.
The course will also delve into the latest technologies and their capabilities, strengths, and weaknesses. You will come away with recommendations and suggestions that will aid in building a robust security infrastructure.
Network security is a broader term that covers a multitude of technologies, devices, and processes. This course focuses on Web security, by protecting a website or web application by detecting, preventing and responding to cyber threats.
This course provides a solid background on current Web and network security issues, as well as how to design web applications to prevent such threats to security.
Network security is a broader term that covers a multitude of technologies, devices, and processes. This course focuses on Web security, by protecting a website or web application by detecting, preventing and responding to cyber threats.
This course provides a solid background on current Web and network security issues, as well as how to design web applications to prevent such threats to security.
CONSEC3 - Network and System Defense
This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.
Knowledge about possible threats and countermeasures is important not only for the network security specialist but also for application programmers and everyone else who wants to understand what level of security a system and an application can offer. By knowing the problems, future systems can be designed to be much more secure and reliable than today.
CONSEC3 - Network and System Defense
This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.
Knowledge about possible threats and countermeasures is important not only for the network security specialist but also for application programmers and everyone else who wants to understand what level of security a system and an application can offer. By knowing the problems, future systems can be designed to be much more secure and reliable than today.
Cryptography Theory and Practice
This course provides an introduction to modern cryptography and communication security. It focuses on how cryptographic algorithms and protocols work and how to use them. The course covers the concepts of block ciphers and message authentication codes, public key encryption, digital signatures, and key establishment, as well as common examples and uses of such schemes, including the AES, RSA-OAEP, and the Digital Signature Algorithm. Basic cryptanalytic techniques and examples of practical security solutions are explored to understand how to design and evaluate modern security solutions.
Cryptography Theory and Practice
This course provides an introduction to modern cryptography and communication security. It focuses on how cryptographic algorithms and protocols work and how to use them. The course covers the concepts of block ciphers and message authentication codes, public key encryption, digital signatures, and key establishment, as well as common examples and uses of such schemes, including the AES, RSA-OAEP, and the Digital Signature Algorithm. Basic cryptanalytic techniques and examples of practical security solutions are explored to understand how to design and evaluate modern security solutions.
Component security deals with the security aspects of the design, procurement, testing, analysis, and maintenance of components integrated into larger systems. This course will teach you the fundamentals of component security, covering vulnerabilities of system components, the component lifecycle, as well as secure component design principles.
Component security deals with the security aspects of the design, procurement, testing, analysis, and maintenance of components integrated into larger systems. This course will teach you the fundamentals of component security, covering vulnerabilities of system components, the component lifecycle, as well as secure component design principles.
Cyber Crime Investigation and Digital Forensics
This course presents an overview of the principles and practices of digital investigation. Students will learn different techniques and procedures that enable them to perform a digital investigation. This course focuses mainly on the analysis of physical storage media and volume analysis. It covers the major phases of digital investigation such as preservation, analysis, and acquisition of artifacts that reside in hard disks and random access memory. The objective of this class is to emphasize the importance of digital forensics and to prepare students to conduct a digital investigation in an organized and systematic way.
This course will provide theoretical and practical knowledge, as well as current research on Digital Forensics. Upon completion of the course, students can apply open-source forensics tools to perform digital investigation and understand the underlying theory behind these tools.
Cyber Crime Investigation and Digital Forensics
This course presents an overview of the principles and practices of digital investigation. Students will learn different techniques and procedures that enable them to perform a digital investigation. This course focuses mainly on the analysis of physical storage media and volume analysis. It covers the major phases of digital investigation such as preservation, analysis, and acquisition of artifacts that reside in hard disks and random access memory. The objective of this class is to emphasize the importance of digital forensics and to prepare students to conduct a digital investigation in an organized and systematic way.
This course will provide theoretical and practical knowledge, as well as current research on Digital Forensics. Upon completion of the course, students can apply open-source forensics tools to perform digital investigation and understand the underlying theory behind these tools.
This course introduces students to the international relations sub-field of human security. The course is divided into the key areas outlined by the UN report on human security. On the later segment of the course, topics will focus from international laws and policies to protecting individuals’ data and privacy in the context of organizations (i.e., as employees) and personal life, in addition to the study of human behavior as it relates to cybersecurity.
This course introduces students to the international relations sub-field of human security. The course is divided into the key areas outlined by the UN report on human security. On the later segment of the course, topics will focus from international laws and policies to protecting individuals’ data and privacy in the context of organizations (i.e., as employees) and personal life, in addition to the study of human behavior as it relates to cybersecurity.
Organizational Security : IT Governance and Security Planning
This course is specifically designed to provide the foundation for understanding the scope of the security function within organizations, the various security techniques needed to protect people, the physical infrastructure and assets, and how to effectively manage a security team.
Organizational Security : IT Governance and Security Planning
This course is specifically designed to provide the foundation for understanding the scope of the security function within organizations, the various security techniques needed to protect people, the physical infrastructure and assets, and how to effectively manage a security team.
Societal Security - Legal Aspects of Information Security
This course is designed to acquaint students with electronic privacy, security, and ethics. Students will gain an understanding of information ethics, existing and emerging cyber-laws, organizational liability issues, and explore several Codes of Ethics. Students will learn about real and potential security issues, steps that can be taken to create environments of trust, how to evaluate the strengths and weaknesses of a firm's information resource environment, and risk management and operation feasibility issues.
Societal Security - Legal Aspects of Information Security
This course is designed to acquaint students with electronic privacy, security, and ethics. Students will gain an understanding of information ethics, existing and emerging cyber-laws, organizational liability issues, and explore several Codes of Ethics. Students will learn about real and potential security issues, steps that can be taken to create environments of trust, how to evaluate the strengths and weaknesses of a firm's information resource environment, and risk management and operation feasibility issues.
Software security involves the development and use of software that reliably preserves the security properties of the information and systems it protects. The security of a system, and of the data it stores and manages, depends in large part on the security of its software. This course provides the fundamental principles and practices for addressing software security issues.
Software security involves the development and use of software that reliably preserves the security properties of the information and systems it protects. The security of a system, and of the data it stores and manages, depends in large part on the security of its software. This course provides the fundamental principles and practices for addressing software security issues.
Coding, Cryptography, and Analytics
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. This course teaches the fundamentals of cryptography, with application of various cryptographic techniques in software applications, as well as apply various cryptographic techniques in different aspects of software.
Coding, Cryptography, and Analytics
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. This course teaches the fundamentals of cryptography, with application of various cryptographic techniques in software applications, as well as apply various cryptographic techniques in different aspects of software.
Information Security Systems Management
This course is designed to teach the fundamentals of security management. The course is not technical in nature, but relies on the student’s previous understanding of security systems. The course instead looks at security from a managerial perspective with regards to design, implementation, maintenance, and disaster recovery.
Information Security Systems Management
This course is designed to teach the fundamentals of security management. The course is not technical in nature, but relies on the student’s previous understanding of security systems. The course instead looks at security from a managerial perspective with regards to design, implementation, maintenance, and disaster recovery.
Security Operations and Administration
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users to define proper data classifications. This will ensure the proper handling of all hard copy and electronic information. The SOC is the heartbeat of daily systems and network operations and is where all the work and security management comes into reality. This course will address the topics of the role of a SOC, configuration management and change control, backup and media management.
Security Operations and Administration
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users to define proper data classifications. This will ensure the proper handling of all hard copy and electronic information. The SOC is the heartbeat of daily systems and network operations and is where all the work and security management comes into reality. This course will address the topics of the role of a SOC, configuration management and change control, backup and media management.
Intrusion Prevention and Penetration Testing Practic
The course enables students to understand the importance of vulnerability in Penetration Testing assessments by providing industry knowledge and skills in Penetration Testing. In doing so, the student can understand how malware and destructive viruses function. In addition, the course helps students learn how to attack and assess different types of systems and networks.
The course provides in-depth labs that focus on both open source and commercial-based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat hackers and/or viruses.
Intrusion Prevention and Penetration Testing Practic
The course enables students to understand the importance of vulnerability in Penetration Testing assessments by providing industry knowledge and skills in Penetration Testing. In doing so, the student can understand how malware and destructive viruses function. In addition, the course helps students learn how to attack and assess different types of systems and networks.
The course provides in-depth labs that focus on both open source and commercial-based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat hackers and/or viruses.
This course equips students with the framework and tools they need to examine, design, build, and implement information systems considering both technological and business factors.
The course concludes with a capstone project for students to synthesize their learning and apply it to a community-driven service organization.
This course equips students with the framework and tools they need to examine, design, build, and implement information systems considering both technological and business factors.
The course concludes with a capstone project for students to synthesize their learning and apply it to a community-driven service organization.
Blockchain and Distributed Ledger Technologies
This course on the Blockchain provides a broad overview of the essential concepts of blockchain technology to lay the foundation necessary for developing applications and programming. Students will learn about the decentralized peer-to-peer network, an immutable distributed ledger and the trust model that defines a blockchain. This course enables learners to explain basic components of a blockchain (transaction, block, block header, and the chain) its operations (verification, validation, and consensus model) underlying algorithms, and essentials of trust (hard fork and soft fork). Content includes the hashing and cryptography foundations indispensable to blockchain programming, which is the focus of two subsequent specialization courses, Smart Contracts and Decentralized Applications (Dapps).
Blockchain and Distributed Ledger Technologies
This course on the Blockchain provides a broad overview of the essential concepts of blockchain technology to lay the foundation necessary for developing applications and programming. Students will learn about the decentralized peer-to-peer network, an immutable distributed ledger and the trust model that defines a blockchain. This course enables learners to explain basic components of a blockchain (transaction, block, block header, and the chain) its operations (verification, validation, and consensus model) underlying algorithms, and essentials of trust (hard fork and soft fork). Content includes the hashing and cryptography foundations indispensable to blockchain programming, which is the focus of two subsequent specialization courses, Smart Contracts and Decentralized Applications (Dapps).
Cloud Computing examines frameworks and techniques used to design, develop, and implement cloud computing systems. Emphasis is on applied and project-based learning approach to set up Windows-based or AWS clouds using client portals, servers, virtual machines, and the accompanying network infrastructure. Cloud Computing provides an in-depth study of the security and privacy of cloud computing systems. The course also addresses the development of an audit to ensure operational integrity and protection of customer data in cloud-based resources in the context of cloud security and privacy.
Cloud Computing examines frameworks and techniques used to design, develop, and implement cloud computing systems. Emphasis is on applied and project-based learning approach to set up Windows-based or AWS clouds using client portals, servers, virtual machines, and the accompanying network infrastructure. Cloud Computing provides an in-depth study of the security and privacy of cloud computing systems. The course also addresses the development of an audit to ensure operational integrity and protection of customer data in cloud-based resources in the context of cloud security and privacy.
The Securing the Internet of Things course will examine the security and ethical issues of the vast implementation of smart devices known as the Internet of Things (IoT). The IoT is an environment where smart devices sense, anticipate, and respond to our needs as we manage them remotely. These smart devices often act as the gateway between our digital and physical world. The IoT touches many aspects of life including transportation, health care, safety, environment, energy, and more. This course will examine and discuss IoT technology and market specific topics, relevant case studies of IoT security vulnerabilities and attacks, and mitigation controls. Students will assess the health, safety, privacy, and economic impacts of IoT security events.
The Securing the Internet of Things course will examine the security and ethical issues of the vast implementation of smart devices known as the Internet of Things (IoT). The IoT is an environment where smart devices sense, anticipate, and respond to our needs as we manage them remotely. These smart devices often act as the gateway between our digital and physical world. The IoT touches many aspects of life including transportation, health care, safety, environment, energy, and more. This course will examine and discuss IoT technology and market specific topics, relevant case studies of IoT security vulnerabilities and attacks, and mitigation controls. Students will assess the health, safety, privacy, and economic impacts of IoT security events.
This course examines the key principles related to auditing information technology processes and related controls and is designed to meet the increasing needs of audit, compliance, security and risk management professionals. Through the application of COBIT® and other similar governance frameworks, students will develop a common vocabulary for understanding sources of IT risk and performing an IT audit. Students will further gain hands-on experience in analyzing and assessing IT risks and controls.
This course examines the key principles related to auditing information technology processes and related controls and is designed to meet the increasing needs of audit, compliance, security and risk management professionals. Through the application of COBIT® and other similar governance frameworks, students will develop a common vocabulary for understanding sources of IT risk and performing an IT audit. Students will further gain hands-on experience in analyzing and assessing IT risks and controls.
Malware Analysis Course for IT Security lays the Groundwork for the course by presenting the key tools and techniques malware analyst use to examine malicious programs. It covers how to combat anti-disassembly, anti-debugging and anti-virtual machine techniques. Additional topics include malware stealth techniques (process injection and rootkit technology), analyses of samples written in alternate programming languages (C++) and popular software frameworks (.NET). You will learn how to save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen's interaction with its Environment such as Registry, Network, the Filesystem Code Analysis focuses on the specimen's code and make use of a disassembler and a debugger.
Malware Analysis Course for IT Security lays the Groundwork for the course by presenting the key tools and techniques malware analyst use to examine malicious programs. It covers how to combat anti-disassembly, anti-debugging and anti-virtual machine techniques. Additional topics include malware stealth techniques (process injection and rootkit technology), analyses of samples written in alternate programming languages (C++) and popular software frameworks (.NET). You will learn how to save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen's interaction with its Environment such as Registry, Network, the Filesystem Code Analysis focuses on the specimen's code and make use of a disassembler and a debugger.
This course covers the design and implementation of secure software. Some of the topics covered are the characteristics of secure software, the role of security in the development lifecycle, designing secure software, and best security programming practices. Security for web and mobile applications will be covered.
This course covers the design and implementation of secure software. Some of the topics covered are the characteristics of secure software, the role of security in the development lifecycle, designing secure software, and best security programming practices. Security for web and mobile applications will be covered.
The course will expose students to statistical techniques that are specific to the areas of business, and finance. Students will develop an understanding and ability to use these techniques across a range of practical problems. The application of such techniques will involve collection of relevant data, the use of professionally popular computer software and the interpretation and use of computer outputs.
The course will expose students to statistical techniques that are specific to the areas of business, and finance. Students will develop an understanding and ability to use these techniques across a range of practical problems. The application of such techniques will involve collection of relevant data, the use of professionally popular computer software and the interpretation and use of computer outputs.
The course will cover mathematical structures that naturally arise in computer science. Includes elementary logic and set theory, equivalence relations, functions, counting arguments, asymptotic complexity, inductively defined sets, recursion, graphs and trees, Boolean algebra and combinatorial circuits, finite state automata, and diagonalization and countability arguments. Emphasizes proofs and problem solving.
The course will cover mathematical structures that naturally arise in computer science. Includes elementary logic and set theory, equivalence relations, functions, counting arguments, asymptotic complexity, inductively defined sets, recursion, graphs and trees, Boolean algebra and combinatorial circuits, finite state automata, and diagonalization and countability arguments. Emphasizes proofs and problem solving.