Áù¾ÅÉ«ÌÃ


Site Navigation
Welcome
Important Notice and Disclaimer
Faculty of Graduate Studies General Information
Graduate Students' Association (GSA)
Academic Schedule
Faculty of Graduate Studies Degrees Information
Admissions
Awards and Financial Assistance for Graduate Students
Tuition and General Fees
Academic Regulations
Program Descriptions
Interdisciplinary Specializations
Courses of Instruction
How to Use
Courses of Instruction by Faculty
Course Descriptions
A
B
C
D
E
F
G
H
I
Information Security and Privacy ISEC
Internship INTE
Interprofessional Health Education IPHE
J, K
L
M
N, O
P
R
S
T, U
V
Z
Student and Campus Services
About the Áù¾ÅÉ«ÌÃ
Graduate Studies Calendar 2020-2021 Courses of Instruction Course Descriptions I Information Security and Privacy ISEC
Information Security and Privacy ISEC

For more information about these courses, see the Department of Computer Science: .

Registration in all courses requires admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security or the Graduate Certificate in Data Privacy, or the approval of the Department of Computer Science.

Information Security and Privacy 601       Applied Cryptography
The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security or the Graduate Certificate in Data Privacy.
back to top
Information Security and Privacy 603       Network Security
Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security.
back to top
Information Security and Privacy 605       System and Application Security
Operating systems security. Software vulnerabilities and their exploits. Malware. Computer system virtualization. Application-level security. Access control models. Identity and access management.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
back to top
Information Security and Privacy 611       Private Data Management
Privacy issues in data collection, analysis and dissemination. Identify and mitigate threats to privacy in various data processing environments. Understand the scope of privacy issues and ethical/legal frameworks. Data anonymization protocols and their applicability.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
back to top
Information Security and Privacy 613       Topics in Privacy
Advanced topics in data privacy.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
MAY BE REPEATED FOR CREDIT
back to top
Information Security and Privacy 621       Ethical Hacking Laboratory
Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security.
back to top
Information Security and Privacy 623       Software Security Laboratory
Practices and tools for preventing vulnerabilities in the software development life cycle, including threat modelling, secure coding idioms and secure design patterns, static analyzers for detecting vulnerabilities, fuzzing and other quality assurance practices.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
back to top
Information Security and Privacy 625       Mobile and Smart Device Security Laboratory
Security architecture of common smartphone platforms and Internet-of-Things environments. Selected topics on threat modelling, penetration testing, and security-aware design for smartphones, home automation, wearables, vehicles and industrial control systems.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
back to top
Information Security and Privacy 631       Privacy by Design Laboratory
Identification of privacy-critical components of large software systems. Design of privacy-focused systems. Privacy for data storage and compliance issues.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
back to top
Information Security and Privacy 641       Governance and Risk Management
Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security or the Graduate Certificate in Data Privacy.
back to top
Information Security and Privacy 643       Policies, Standards and Programs
Development of security and privacy policies. Policy compliance and enforcement in various legislative frameworks. Policy considerations for social engineering and insider attacks. Information security and privacy standards. Security/privacy awareness and training programs. Development of Privacy Impact Assessments.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security, or the Graduate Certificate in Data Privacy.
back to top
Information Security and Privacy 645       Incident Management and Forensics
Design and implementation of process for identifying, analyzing and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security, or the Graduate Certificate in Data Privacy.
back to top