August 2018 – August 2020
Overall GPA: 3.97
Completed Courses
Fall 2018
Security I – Foundations of Cyber Security
This course introduces students to fundamental security principles and security defense. Students learn the concepts of information security risks, vulnerabilities, assets and threats.
Security II – Introduction to Cyber Threats
This course introduces students to the analysis of cyber threats. Students learn to identify bad actors in cyberspace and assess their resources, capabilities, techniques and motivations. Students learn to describe different types of cyber attacks and their characteristics
Security III – Introduction to Cyber Defense
Students learn about cyber defense tools and techniques. This course covers how to apply cyber defense tools and techniques to prepare a system to repel attacks.
Cyber Policy
There are three parts to this course. The first part covers the applicable federal and state laws and policies related to cyber defense, pertaining to the storage and transmission of data. In the second part, students analyze and develop enterprise security policies. Finally, students learn how to implement machine security policies.
Spring 2019
Operating Systems Security
This course introduces students to operating systems and the software to support these systems. Topics include operating system security configuration, control objectives, control maintenance and forensics. The course includes hands-on implementation of security controls, including access management, file and process security configuration, and security monitoring.
Database I – Relational Database Security
This course introduces students to different relational database management systems (DMS) and DMS security concerns and methods. Topics covered include hashing and encryption, database access controls, unauthorized access, data corruption and injection.
Database III – Non-Relational Data Security
This course introduces students to the theory, application and security of nonrelational database systems. It focuses on data management, query and security aspects of nonrelational databases. Topics include a comparison between relational and nonrelational database models, NoSQL storage types for different databases such as MongoDB, Hadoop, Amazon DynamoDB, document-based databases and graph databases.
Embedded Device Security
This course covers security as it pertains to embedded devices, embodied by the growth of the Internet of Things (IoT). Students learn about the specific security issues related to embedded devices, including Linux malware, DDoS attacks, botnets, cryptography and personal privacy.
Summer I 2019
Intro/Programming Security
This course introduces students to basic scripting and programming concepts needed for security defense. Course topics include writing scripts for Windows and Linux; understanding basic programming security concepts; basic programming constructs, such as variables, types, loops, functions and data structures.
Prog Security Analytics
This course introduces students to basic command-line methods used in machine data analytics. Student learn how to collect machine logs, search log data, and identify anomalies in logs.
Prog Security Automation
This course focuses on programming methods that are applicable to security automation. Students gain experience in automation using Python and Cloud native CLI to facilitate such tasks as automated code scanning; automated application scanning in testing and staging; automated network, server, container configuration checks; and continuous monitoring of development pipeline components and job scheduling.
Fall 2019
Workforce Access Security
This course focuses on authentication and user access technologies and practices within the enterprise. Topics include Active Directory services and architecture, and enterprise network access protocols.
B2B Access Security
This course covers access concepts based on B2B communication APIs, such as standard-based protocols and B2B on-boarding, for mobile, social and loT applications.
B2C Access Security
This course focuses on authentication and user access technologies and practices within B2C access. Topics include standards-based B2C authentication and access management protocols.
Intro to Cloud Security
In this course, students learn fundamentals of Cloud computing and Cloud security. This course covers topics such as shared responsibility models for laaS, PaaS, SaaS and FaaS, and Cloud Security Alliance CCM. Students get hands-on experience creating secure systems within a commercial Cloud vendor environment.
Securing Workloads in AWS
This course covers concepts and practices for securing AWS workloads. Students are introduced to security controls, such as access controls using IAM, logging and auditing, and other AWS security services.
Securing Workloads in Azure
This course covers concepts and practices for securing Azure workloads. Students are introduced to security controls, such as access controls using IAM, logging and auditing, and other AWS security services.
Spring 2020
Intro to Secure Networking
This course introduces students to the theoretical and practical aspects of designing, developing and defending computer networks. Topics include network models, media, architectures, devices, protocols, services, applications and use of network security tools.
Resilient System Design/Dev
This course introduces students to the concepts of secure system design and cyber resilience. The content of this course includes best security processes recommended in NIST 800-160 and techniques and technologies needed for secure system design and development.
Resilient System Testing
This course introduces students to state-of-the-art concepts and methods to evaluate cyber resiliency. Topics include breach and attack simulation, configuration assessment and compliance. Hands-on experience with systems testing tools is part of this course.
Intro to Cryptography
This course introduces students to cryptography algorithms, protocols and applications. Topics include history; applications, such as SSL and SSH; and protocols, such as hash functions, symmetric and asymmetric cryptography, and attack-vectors for systems
Operating Resilient Systems
This course includes hands-on experience with tools for security activities such as intrusion detection and cloud security monitoring. Other topics this course covers include Site Reliability Engineering (SRE), maintaining situational awareness and dynamic threat.
Capstone I
This capstone course is designed to enable students to directly utilize what has been learned in the tools and applications courses in order to analyze and offer solutions for a major cybersecurity challenge. A definition of the problem, analysis of options and a comprehensive presentation of findings and solutions are required components of the course.
Capstone II
This course enables students to explore the computer security profession by working independently or in teams, under the guidance of a mentor, on a significant security-related project. In the second part of this two-course sequence, students complete work on their project and create an appropriate formal presentation of their results
Summer II 2020
Secure Web App Design
This course covers the design and architecture of secure web applications, such as: traditional three-tier architectures, SOA, microservices, FaaS; application protocols; authentication and session management; client and server-side controls; input-based vulnerabilities and web application attack trends.
Secure Web App Engineering
In this course, students learn processes and practices needed to secure applications within the Software Development Life Cycle (SDLC). The course covers traditional SDLC processes and methods to secure modern Cloud native development processes and using concepts of DevSecOps
Web App Security Testing
This course introduces students to web application security testing. Topics include application security metrics, selecting the right testing tool and integrating the results into the development life cycle. Students gain hands-on experience using these tools in practical settings