|
For more information about these courses, see the Department of Computer Science: science.ucalgary.ca/computer-science.
Registration in all courses requires admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security or the Graduate Certificate in Data Privacy, or the approval of the Department of Computer Science.
|
|
Information Security and Privacy
601
|
Applied Cryptography
|
|
The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security or the Graduate Certificate in Data Privacy.
|
back to top | |
|
Information Security and Privacy
603
|
Network Security
|
|
Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security.
|
back to top | |
|
Information Security and Privacy
605
|
System and Application Security
|
|
Operating systems security. Software vulnerabilities and their exploits. Malware. Computer system virtualization. Application-level security. Access control models. Identity and access management.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
|
back to top | |
|
Information Security and Privacy
611
|
Private Data Management
|
|
Privacy issues in data collection, analysis and dissemination. Identify and mitigate threats to privacy in various data processing environments. Understand the scope of privacy issues and ethical/legal frameworks. Data anonymization protocols and their applicability.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
|
back to top | |
|
Information Security and Privacy
613
|
Topics in Privacy
|
|
Advanced topics in data privacy.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
MAY BE REPEATED FOR CREDIT
|
back to top | |
|
Information Security and Privacy
621
|
Ethical Hacking Laboratory
|
|
Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security.
|
back to top | |
|
Information Security and Privacy
623
|
Software Security Laboratory
|
|
Practices and tools for preventing vulnerabilities in the software development life cycle, including threat modelling, secure coding idioms and secure design patterns, static analyzers for detecting vulnerabilities, fuzzing and other quality assurance practices.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
|
back to top | |
|
Information Security and Privacy
625
|
Mobile and Smart Device Security Laboratory
|
|
Security architecture of common smartphone platforms and Internet-of-Things environments. Selected topics on threat modelling, penetration testing, and security-aware design for smartphones, home automation, wearables, vehicles and industrial control systems.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Software Security.
|
back to top | |
|
Information Security and Privacy
631
|
Privacy by Design Laboratory
|
|
Identification of privacy-critical components of large software systems. Design of privacy-focused systems. Privacy for data storage and compliance issues.
Course Hours:
3 units; (1-3-2T)
Prerequisite(s):
Admission to the Graduate Certificate in Data Privacy.
|
back to top | |
|
Information Security and Privacy
641
|
Governance and Risk Management
|
|
Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security or the Graduate Certificate in Data Privacy.
|
back to top | |
|
Information Security and Privacy
643
|
Policies, Standards and Programs
|
|
Development of security and privacy policies. Policy compliance and enforcement in various legislative frameworks. Policy considerations for social engineering and insider attacks. Information security and privacy standards. Security/privacy awareness and training programs. Development of Privacy Impact Assessments.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security, or the Graduate Certificate in Data Privacy.
|
back to top | |
|
Information Security and Privacy
645
|
Incident Management and Forensics
|
|
Design and implementation of process for identifying, analyzing and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices.
Course Hours:
3 units; (3-0)
Prerequisite(s):
Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Software Security, or the Graduate Certificate in Data Privacy.
|
back to top | |
|