NCSU: Innovative Curriculum for Cybersecurity Education

North Carolina State University
Undergraduate and Graduate level.
“An Innovative Curriculum for Cybersecurity Education.”

The course materials described below are accessible via the Cyber Curriculum Library - online portal. CLICK HERE to LOGIN.

Topics and Subtopics include:

“Introduction to Computer Security” with emphasis on secret key and public key crypto, user authentication, OS security and access control, malware, buffer overflows, control hijacking, sandboxing, reverse engineering, symbolic execution, fuzzing, security auditing and forensics, network security, including TCP/IP and DNS security, and wi-fi security, DDoS, firewalls and intrusion detection systems, botnets and cybercrime, social networks security, web security and policies, anonymous communication and privacy, standards and standard-setting organizations, legal and ethical aspects of security, and human factors and social engineering.

“Network Security” with emphasis on basic cryptography, authentication, network attacks and defenses, and malware.

“Software Security” with emphasis on security risk management, security testing, secure coding techniques, and security requirements, validation and verification.

“Privacy” with emphasis on inference attacks and defenses, online tracking, advertising and web privacy, measurement challenges, and measurement applications.

“Computer and Network Security” with emphasis on cryptographic techniques and ciphers, key agreement protocols, public key infrastructure, security requirements and risk assessment, user authentication, authentication protocols, transport layer security, operating systems security, access control methods, software and service vulnerabilities, TCP/IP exploits, worms, DDoS, botnets, DNS, routing attacks, Wi-Fi exploits, IPsec and VPNs, anonymous communication and traffic analysis, firewalls, intrusion detection techniques, web security, cloud security, and mobile security.

And “Cryptography” with emphasis on learning to formally define security properties, understanding of computational hardness assumptions, and how to formally prove a cryptographic protocol satisfies security definition.

NCWF Categories included:
 

NCWF Specialty Areas included:

 

NCWF KSAs included:

K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.

K0002: Knowledge of risk management processes.

K0003: Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.

K0004: Knowledge of cybersecurity and privacy principles.

K0005: Knowledge of cyber threats and vulnerabilities.

Summary:

Six total modules, with suggested order of modules included. Dependencies between modules will be shown via module mapping included. Suggested readings, presentation materials, exercises, and self-assessment questions are included. One or more servers with substantial amount of memory, storage and processing power are recommended to use this curriculum. Extensive hands-on exercises are included. The following are the undergraduate/graduate modules: Introduction to Computer Security, Undergraduate. Network Security, Undergraduate. Software Security, Undergraduate and Graduate. Privacy, Undergraduate and Graduate. Computer and Network Security, Undergraduate and Graduate. Cryptography, Undergraduate and Graduate.