Course Description

This course provides an introduction to technical aspects of cyber security. It describes threats and types of attacks against computers and network to enable students to understand and analyze security requirements and defines security policies. Security mechanisms and enforcement issues will be introduced. Students will be immersed in the cyber-security discipline through a combination of intense coursework, real-world problems, and hands on experiments.


ECE578: Fundamentals of Computer Networks


  • Instructors: Youssif Al-Nashif
  • Lecture: 4:00 - 6:30 PM Th in ECE258
  • Office hours: 11:00 AM - 12:00 PM Th in ECE356p
  • Textbook: Research papers

Recommended References

Stallings, William; Brown, Lawrie. Computer Security: Principles and Practice (2nd Edition) Pfleeger, Charles P.; Pfleeger, Shari Lawrence. Security in Computing (4th Edition) Katz, Jonathan; Lindell, Yehuda. Introduction to Modern Cryptography Qian, Yi; Tipper, David; Krishnamurthy, Prashant; Joshi, James. Information Assurance: Dependability and Security in Networked Systems

Grading Policy

  • Homework and Assignments: 25%
  • Midterm Exam: 10%
  • Term paper + Presentation: 25%
  • Term project: 25%
  • Final Exam: 15%


  1. Review of Cyber Security Issues and Network Attacks 2. Classification of Network Attacks
    • Scanning/Probe
    • DoS/DDoS attack
    • Worm/Virus/Trojans
    • Spam/Botnet/Phishing
  2. Study of Security Techniques
    • Encryption/Authorization/Authentication
    • Access Control Matrix
    • Firewall/IDS/IPS
    • IPSec
    • Honeypot
  3. Network Security Monitoring (NSM)
    • Payload/Session/Connection level
    • Active/Passive Monitoring
  4. Vulnerability Analysis
    • Operating System
    • TCP/UDP Protocols
    • ICMP, and other protocols
    • Applications (Web, Database)
  5. Wireless Network Attacks • Monitoring
    • Detection
    • Prevention
  6. Network Defense Systems – Case Studies
    • Research Projects
    • Commercial Systems/Tools

Prohibited Conduct

Source: Students enrolled in academic credit bearing courses are subject to this Code. Conduct prohibited by this Code consists of all forms of academic dishonesty, including, but not limited to:
  1. Cheating, fabrication, facilitating academic dishonesty, and plagiarism as set out and defined in the Student Code of Conduct, ABOR Policy 5-308-E.10, and F.1
  2. Submitting an item of academic work that has previously been submitted or simultaneously submitted without fair citation of the original work or authorization by the faculty member supervising the work.
  3. Violating required disciplinary and professional ethics rules contained or referenced in the student handbooks (hardcopy or online) of undergraduate or graduate programs, or professional colleges.
  4. Violating discipline specific health, safety or ethical requirements to gain any unfair advantage in lab(s) or clinical assignments.
  5. Failing to observe rules of academic integrity established by a faculty member for a particular course.
  6. Attempting to commit an act prohibited by this Code. Any attempt to commit an act prohibited by these rules shall be subject to sanctions to the same extent as completed acts.
  7. Assisting or attempting to assist another to violate this Code.