collapse allexpand all
- D class assignments for on-campus graduate students are available by emailing firstname.lastname@example.org D class assignments for DEN@Viterbi are available to students enrolled in the Distance Education Network. For more information go to den.usc.edu
Threats to information systems; technical and procedural approaches to threat mitigation; secure system design and development; mechanisms for building secure security services; risk management. Recommended preparation: Background in computer security preferred. Recommended previous courses of study include computer science, electrical engineering, computer engineering, management information systems, and/or mathematics.
|32420D||048||Lecture||6:40-9:20pm||Thursday||16 of 25||Blaine Burnham||RTH105|
|32430D||034||Lecture||6:40-9:20pm||Thursday||5 of 25||Blaine Burnham||DEN@Viterbi|
Application of cryptography and cryptanalysis for information assurance in secure information systems. Classical and modern cryptography. Developing management solutions. Recommended preparation: Previous degree in computer science, mathematics, computer engineering, or informatics; understanding of number theory and programming background are helpful.
|32421D||048||Lecture||3:30-6:10pm||Thursday||18 of 25||Blaine Burnham||OHE136|
|32431D||034||Lecture||3:30-6:10pm||Thursday||4 of 25||Blaine Burnham||DEN@Viterbi|
Policy as the basis for all successful information system protection measures. Historical foundations of policy and transition to the digital age. Detecting policy errors, omissions and flaws. Recommended preparation: Background in computer security, or a strong willingness to learn. Recommended previous courses of studies include degrees in computer science, electrical engineering, computer engineering, management information systems, and/or mathematics.
|32422D||048||Lecture||12:30-1:50pm||Tue, Thu||17 of 25||Roger Schell||RTH217||PDF (234977 KB)|
|32432D||034||Lecture||12:30-1:50pm||Tue, Thu||2 of 25||Roger Schell||DEN@Viterbi||PDF (234977 KB)|
Assurance as the basis for believing an information system will behave as expected. Approaches to assurance for fielding secure information systems that are fit for purpose. Recommended preparation: Prior degree in computer science, electrical engineering, computer engineering, management information systems, and/or mathematics. Some background in computer security preferred.
|32423D||048||Lecture||6:40-9:20pm||Wednesday||13 of 25||Blaine Burnham||OHE120|
|32433D||034||Lecture||6:40-9:20pm||Wednesday||3 of 25||Blaine Burnham||DEN@Viterbi|
Fundamentals of information security in the context of distributed systems and networks. Threat examination and application of security measures, including firewalls and intrusion detection systems. Recommended preparation: Prior degree in computer science, mathematics, computer engineering, or informatics. It is recommended that students have a working understanding of communication networks and computer architecture, and some programming facility.
|32424D||048||Lecture||2:00-4:40pm||Wednesday||16 of 25||Blaine Burnham,|
Analysis of computer security and why systems are not secure. Concepts and techniques applicable to the design of hardware and software for Trusted Systems. Recommended preparation: Prior degree in computer science, mathematics, computer engineering, or informatics; advanced knowledge of computer architecture, operating systems, and communications networks will be valuable.
|32425D||048||Lecture||9:30-10:50am||Tue, Thu||13 of 25||Roger Schell||KAP148|
Research leading to the master's degree; maximum units which may be applied to the degree to be determined by the department. Graded CR/NC.
- Restriction: Registration open to the following major(s): INF
|32449D||048||2.0||Lecture||TBA||TBA||1 of 10||Roger Schell||OFFICE|