CSF - Security and Forensics (CSF)

CSF 2113 Programming for Information Security (2-2-3)

The course develops the necessary coding skills for the Security and Forensics students to carry out security-related tasks. Students will be Identifying building blocks of a specific scripting language to develop scripts for automating tasks for web scraping, penetration testing and resource discovery, and other security and forensics-related objectives.

Prerequisites: CIS 2903, ICT 2013

CSF 3003 Cyber Law and Ethics (3-1-3)

The course provides an insight into the laws and regulations of cyberspace, from a general understanding of the legal issues in information systems security and privacy, to the legal, managerial, and ethical issues affecting technology-enabled organizations.

Prerequisites: CIS 2103

CSF 3103 Incident Response and Disaster Recovery (2-2-3)

The course develops two threads: Analyzing and responding to attacks, and recovering the system from attacks or disasters. The student will be prioritizing attacks facing an organization using standard techniques. Recovering from attacks, incidents, and disasters by implementing a variety of tools. Identifying system vulnerabilities, taking appropriate countermeasures, developing an incident response and recovery plan, and finally implementing a disaster recovery plan to minimize downtime.

Prerequisites: CIN 2103

CSF 3203 Intrusion Detection and Ethical Hacking (2-2-3)

The course utilises intrusion detection techniques for the purpose defending and securing organisational information infrastructures. The students will be identifying methods used in computer and network hacking in order to better protect systems from such intrusions. Describing the role of a penetration tester, including what an ethical hacker do legally. Examining different types of malicious software. Implementing hacking and tools and techniques to determine potential system vulnerabilities. Reflecting on the purpose of defending organisational and information infra-structure.

Prerequisites: CIS 2903

CSF 3403 Computer Forensics and Investigation (2-2-3)

The course analyses various computer systems that have been compromised. The student will be performing a systematic investigation, recovering critical data and aiding authorities in tracking those who caused the security breach. Analysing and investigating digital evidence as related to UAE Cyber Law. Producing evidence for presentation in a UAE court of law. Analysing crime incident reports using software and hardware computer forensics tools. Recovering digital data using forensics techniques. Developing a report of the breach.

Prerequisites: CIN 2003

CSF 3603 Cryptography and Network Security (2-2-3)

The course introduces key concepts of encryption such as ciphers, symmetric and asymmetric encryption. The student will be identifying system attacks and countermeasures. Recognizing the basic concepts of cryptography using various encryption techniques. Analyzing public-key infrastructure, digital signatures and hash functions. Applying cryptosystems to various domains including wired and wireless networks, email, web security, and blockchain.

Prerequisites: CIS 2103

CSF 4003 Security and Risk Management (3-1-3)

This course recognizes information security from the perspective of risk management. The course discusses key information security management concepts and organizational roles for access, control, and business continuity management. Students will learn methods of information security risk assessment, intellectual property protection, organizational structure assessment, threat modeling for critical infrastructure protection, manage the risk via contingency planning to reduce unexpected events, implementing analytical tools for quantifying risk, and the costs and benefits of mitigation tools.

Prerequisites: CSF 3403 or CIS 2103

CSF 4103 Web Application Security (2-2-3)

The course discovers and exploits security flaws and major vulnerabilities inherent in web applications. The student will be applying various tools for mapping a web application in order to identify its vulnerabilities. Identifying tools and techniques to secure vulnerabilities in client-side controls, authentication, session management, and access controls. Initiating injection attacks, and appropriate countermeasures to test and secure web applications. Applying various defense mechanisms to secure web applications against possible attacks.

Prerequisites: CSF 3603, CSF 3203

CSF 4113 Web Application Security (2-2-3)

Build an understanding of the security problem inherent in web applications. Categorize the most common Web application security flaws and their countermeasures. Apply various attacks and appropriate countermeasures to secure Web applications. Scan a web application for security flaws, analyze and report the findings, and propose fix recommendations.

Prerequisites: CNS 3023, CNS 3123

CSF 4203 Telecommunications and WAN Security (2-2-3)

The course Identifies different data communication and transmission techniques in telecommunication and WAN. The student will be discussing TCP/IP and OSI protocol reference models and configuring circuit-switching and packet-switching technologies. Implementing various WAN protocols including Frame relay, ATM, MPLS and Wireless WAN. Designing and configuring WAN technologies and VPN for business data communications.

Prerequisites: CSF 3603

CSF 4213 Incident Response and Disaster Recovery (2-2-3)

The course develops two threads: Analyzing and responding to attacks, and recovering the system from attacks or disasters. The student will be prioritizing attacks facing an organization using standard techniques. Recovering from attacks, incidents, and disasters by implementing a variety of tools. Identifying system vulnerabilities, taking appropriate countermeasures, developing an incident response and recovery plan, and finally implementing a disaster recovery plan to minimize downtime.

Prerequisites: CNS 2103

CSF 4403 Computer Forensics and Investigation (2-2-3)

The course analyses various computer systems that have been compromised. The student will be performing a systematic investigation, recovering critical data and aiding authorities in tracking those who caused the security breach. Analyzing and investigating digital evidence as related to UAE Cyber Law. Producing evidence for presentation in a UAE court of law. Analyzing crime incident reports using software and hardware computer forensics tools. Recovering digital data using forensics techniques. Developing a report of the breach.

Prerequisites: CNS 2003

CSF 4613 Security Intelligence (2-2-3)

The course expresses a more developed understanding of the anomalies and suspicious activities related to Information Technology. The student will be exploring a deep visibility into network, user, application activity, and Security Information and Event Management. Consolidating security's relevant data from various sources to perform in-depth analysis, and to investigate threats and generate reports that meet compliance and standard regulatory schemes.

Prerequisites: CIS 2103