Description: This concentration enables students to reason about information systems from a security engineering perspective taking into account technical, economic, and policy factors. The concentration covers a broad set of topics including elementary cryptography, security policy, common vulnerabilities, penetration testing and defensive security.

Faculty contacts: Edwin Kairu, Emmanuel Ndashimye

Concentration requirements

 


Core
(24 units)

Applications
(12-24 units)

Policy and Management
(0-12 units)

04-800 (12) Vulnerability Assessment & Testing

18-631 (12) Introduction to Information Security
04-800 (12) Security Assessment Project

04-801 (6) Bitcoin and Crypto Currencies

04-801 (6) Ethical Hacking

18-731 (12) Network Security
19-608 (12) Privacy, Policy, Law & Tech

95-744 (6) Cybersecurity Policy and Governance

95-752 (12) Introduction to Information Security Management

95-755 (6) Information Security Risk Management I
Course Course Name Location Units Semester Offered
18-631-RW Introduction to Information Security Africa 12 Spring

Core

(24 units)

Course Course Name Location Units Semester Offered
04-800-K Vulnerability Assessment and Testing Africa 12 Fall
18-631-RW Introduction to Information Security Africa 12 Spring

Security Applications

(12 - 24 units)

Course Course Name Location Units Semester Offered
04-800-P Intrusion Detection Systems Africa 12 Spring
04-801-P4 Machine Learning in Computer Networks and Security Pittsburgh 6 Spring
04-801-Q4 Applied Cryptography Africa 6 Spring
18-731-RW Network Security Africa 12 Fall

Security Policy and Management

(0 - 12 units)

Course Course Name Location Units Semester Offered
19-608 Privacy, Policy, Law & Tech Africa 12 Fall
95-752 Introduction to Information Security Management Africa 12 Spring
95-757 Information Security Risk Policy & Management Africa 6 Spring

Concentration Declaration Process

For Existing Students: Concentrations are documented via the Concentration Declaration Form.