Pre-college Cybersecurity Program
Cyber Physical Lab
In the summer of 2018, Kai Zeng, professor in the Department of Electrical and Computer Engineering, worked with a group of students who developed realtime and lightweight authentication for UAVs to secure the communication between the controller and UAV.
The Future of Cybersecurity is Here.
Prepare for a career in one of the fastest growing fields around with this hands-on intensive Pre-college Cybersecurity program. Middle and high school students to learn how to apply technical skills in cybersecurity careers for the future.
Pre-college Cybersecurity Program
Prepare yourself to translate technical skills in cybersecurity careers. You will take courses focused on cybersecurity for two years, or eight quarters, for 10 weekends in each. Best of all, no background is necessary in technology, because we provide the foundation. Courses include fundamentals of hardware, software, networking, cybersecurity, ethical hacking, and computer forensics. Best of all, no background is necessary in technology, because we provide the foundation then you can this foundation to participate in research in our labs.
List of Courses
Introduces SecSDLC (Security System Development Life Cycle) with emphasis on security investigation, security, design, implementation, maintenance, and change.
Introduces to basic hardware and software, including installing operating systems, hard drives, motherboard, and input / output devices. Students learn how to maintain and optimize operating system and troubleshoot hardware problems. Introduces students to different networking types, mobile devices, and virtualization.
Discusses OSI model, how computers find each other on networks, and how data is transported over networks. Introduces basic cabling and network map that can be used in network troubleshooting. Examines how nodes exchange wireless signals and identifies potential obstacles to successful wireless transmission. Explores cloud computing, remote access, and network’s performance due to unified communications. Topics such as network segmentation, virtualization, wide area network, and SCADA systems are elaborated.
Introduces information security terminology, attacks, and defenses. Discusses personal security, computer security, Internet security, mobile security, and workplace security.
Introduces to application and network-based attacks, including server-side web application attacks, client-server application attacks, impartial overflow attacks, DoS, interception, poisoning, and attacks on access rights. Discusses securing the devices, operating system, and application hardening and patch management. Crypotographic algorithms such as hash, symmetric, and asymmetric are introduced.
Discusses digital certificates, PKI, key management, and cryptographic transport protocol, such as SSL, TLS, SSH, HTTPS, and IPsec. Introduces to NAT, NAC, DMZ, subnetting, WEP, WPS, WPA, WPA2, authentication services and account management.
Introduces professional codes of ethics. Explores “right to privacy” and legal and moral issues concerning privacy. Intellectual property, copyrights, patents, trademarks, copy protection, virus, intrusion, and plagiarism are discussed.
In-depth introduction to ethical hacking, footprinting, scanning, enumeration, system hacking, trojans, backdoors, viruses, worms, sniffers, social engineering, phishing, DoS, buffer overflows, session hijacking, hacking web servers, web application vulnerability, web-based password cracking techniques, hacking web browsers, SQL injection, and hacking database servers.
In-depth introduction to linux hacking, Mac OS hacking, hacking routers, cable modems, and firewalls, hacking mobile phones, PDAs, and handheld devices, Bluetooth hacking, RFID hacking, and hacking USB devices.
In-depth introduction to hacking wireless networks, physical security, evading IDS, firewalls, and detecting honeypots, and cryptography.
In-depth introduction to computer investigation process, first responder procedures, incident handling, and investigative reports. Discusses file systems and hard disks, digital media devices, operating system forensics and boot processes. Includes application password crackers.
In-depth introduction to steganography, data acquisition and duplication, forensic investigation using EnCase and recovering deleted files and deleted partitions.
Investigation of network traffic, web attacks, router forensics, DoS attacks, Internet crime. Explores tracking e-mails and investigating e-mail crime, investigating corporate espionage, trademark and copyright infringement, and sexual harassment incidents. Investigating wireless attacks, iPod, and iPhone forensics.
Introduces to reconnaissance, scanning tools, sniffers, TCP/IP vulnerabilities, encryption and password cracking. Explores spoofing, session hijacking, hacking network devices, web and operating system vulnerabilities.
Discusses planning for organization readiness, contingency strategies for IR/DR/BC, incident response planning, detection, decision making, organizing and preparing CSIRT, response strategies, recovery and maintenance. Also explores disaster recovery preparation and implementation, operation and maintenance, and business continuity planning. Covers crisis management and international standards in IR/DR/BC.
Discusses the culture of higher education. Topics such as accepting personal responsibility, discovering self-motivation, mastering self-management, employing interdependence, gaining self-awareness, adopting life-long learning, developing emotional intelligence, and staying on course to your success are discussed.