Nondegree students register through Continuing Education’s ACCESS program (Fall/Spring term). Students pay ACCESS tuition rates. Nondegree students enrolling through ACCESS may be eligible for Continuing Education scholarships.
- Complete and submit the Online Enrollment Application for Continuing Education. You will receive an email with your student ID number and instructions on how to enroll.
- Enroll for classes through ACCESS. Students must wait until the Friday before classes begin each semester to enroll through ACCESS.
For additional course information, search "CYBR" at classes.colorado.edu.
Introduces students to major topics and research at the interface of technology, cybersecurity, and policy by providing a weekly series of lectures with questions and discussion, including guest speakers.
Combining conceptual knowledge about data communications and core Internet technologies with hands-on labs that reinforce the conceptual knowledge, this course provides students with the ability to create innovative technology solutions in their discipline. Learning how the Internet works and being able to evaluate and operate an Internet network is a valuable skill; students in this course will have a competitive advantage in this foundational field.
Introduces the basic use and administration of Linux systems. Topics include booting and system management, scripting, storage and logical volume management, filesystem configuration, account management and password security, process control, software installation, event logging and system auditing. Students will also develop familiarity with virtualization platforms such as VirtualBox and VMware to implement and test their Linux configurations.
Overviews the distinctive characteristics of the wireless communications medium. Topics covered include: Analog signals, Antennas and Propagation, Digital Signals, Sampling, Quadrature Signals, Digital Modulation, Receiver Structures, SNR and SINR Concepts, Channel Models, Channel Statistics, and Link Budgets. The course includes an introduction to MIMO and beamforming as implemented in modern communication systems along with associated applications to information theory and Shannon’s channel capacity theorem.
Studies technologies and architectures employed in modern cellular wireless systems. Major topics include radio propagation, multiple access techniques, analog and digital cellular telephony, and personal communications systems. Presents the necessary tools to understand the wireless industry, its technical details, and its business drivers. Topics include modeling, spectrum, weather, multipath, Doppler effect, and shadowing and covers important aspects of multiple access technologies such as CDMA and OFDMA. introduces modern radio standards including LTE.
Features technology law advocacy before administrative, legislative and judicial bodies in the public interest. A hands-on opportunity to do advocacy in the law school’s in-house legal clinic that requires a significant time commitment. Not a traditional lecture class. NOTE: This is a full year offering and requires instructor consent. Interested students should contact the instructor with a short statement of interest and set up a time to meet before being accepted.
Introduces core concepts in cybersecurity including confidentiality, integrity, authentication, risk management, and adversarial thinking. The concepts will be applied to both traditional information technology (IT) systems and cyber physical systems (CPS). The course provides a cyber security foundation that will allow practitioners in other fields apply to understand cyber security trade-offs and will also provide interested students with a basis further study in cyber security. At the conclusion of the course, students should have a solid foundation in cybersecurity and hands-on experience.
Provides a hands-on, gamified, virtual environment that builds upon CYBR 5300 Intro to Cybersecurity. Students are given problems in cybersecurity and are expected to research ways to solve them, given ideas or hints to get them started. Students practice offensive skills in password cracking and exploit development to understand vulnerabilities and then focus on defensive tactics to reduce cyber risk and respond to cyber-attacks. This course is geared for the didactic learner and creative problem solver. At the conclusion of the course, students will have experience using several real-world tools against actual threat attacks.
Learn how to identify, collect, examine, analyze, and present digital evidence and the legal challenges associated with conducting digital forensics investigations. Explore various file system types and structures. Learn how to recovery and extract potential evidence from deleted files and directories. Learn how to capture and profile data residing in live memory. Analyze running processes and recover memory artifacts. Learn about various methods data can be hidden on a computing devices, storage media, and within covert communications channels.
This course is an introduction to the principles and techniques associated with security auditing and penetration testing. Topics covered include; planning, reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting. Students discover how system vulnerabilities can be exploited. Students will develop an understanding of current cybersecurity issues and how user, administrator, and programmer errors can result in security breaches.
Engage in the critical strategic analysis and debate of controversial public policy issues raised by the Internet. Learn how to develop well-reasoned positions on the regulations applied to new Internet-based technologies and business models based on interdisciplinary frameworks that characterize the significant intersection of technology, economics, business, and public policy. Policy topics covered include Broadband as a Universal Service, Net Neutrality, Spectrum Management, Online Privacy, and Cybersecurity.
Examines laws governing telecommunications industries, including federal and state regulation and international aspects. Includes telephone, cable, satellite, cellular and other wireless systems and the Internet.
This two-semester sequence includes CYBR 5700 Graduate Projects I and CYBR 5710 Graduate Projects II. Teaches students how to engineer a complex, inter/multidisciplinary design and implementation problem in a group environment.
Discover the technological principles of a human-made device, object, or system through analysis of its structure, function, and operation. Students will extensively study malicious software and learn about assembly languages and C libraries, e.g., C++.
Participants will learn about best practices in leadership within the technology space and hone the skills necessary to succeed at the next level, practically applying what they have learned. This course will teach participants how to become the leader they want to be - a critical piece in forging a new professional path.
NOTE: This course is moving to Continuing Education.
This course gives students a thorough background in the technical, administrative, economic, and political aspects of radio spectrum utilization. It examines radio spectrum use at both national and international levels. Radio spectrum is a major driver of worldwide economic productivity. Its effective use is essential to the public interest due to its economic impact, its impact on human communications, its criticality for defense needs and its role in numerous safety-of-life and remote sensing missions. Radio spectrum is a strictly limited but infinitely renewable resource. Its infinite renewability and limited availability presents a paradox that drives much of the way that it is utilized.
Examines Colorado's unique political background and its implications for technology and cybersecurity. We will review the basics of running for office, campaign finance, and redistricting in Colorado; and learn about the state budget, including a review of the TABOR Amendment, Gallagher Amendment, and Amendment 23. Also, we will look at the unique aspects of lawmaking in Colorado, including Colorado's Sunshine Law and Open Records Act, and review these and other dynamics while analyzing the role of the state legislature in passing laws that keep pace with the 21st century technology and cybersecurity needs.
Gives students hands-on experience applying practical security skills and adversarial thinking to real-world problems. Students will work in small teams on internal challenges, lab development, open source contributions, and will represent the university in larger teams for external challenges at the national and global level, such as those hosted by Collegiate Cyber Defense Competition (CCDC), Wicked6, DOE CyberForce, etc. Students will be expected to participate in both internal and external challenges, attend meetings, and present short presentations to the group when appropriate. Before taking this class it is recommended that you have taken CYBR 5300.
This course provides an introduction to network security. Students successfully completing this class will be able to evaluate works in academic and commercial security and will have rudimentary skills in security research. The course will cover a number of seminal papers and monographs in a wide range of security areas. Topics covered include network security, authentication, security protocol design and analysis, security modeling, key management, intrusion detection, DDoS detection and mitigation, biometrics, web security, privacy, anonymity, and other emerging topics. Most of the course readings will come from seminal papers in the field. Links to these papers will be provided on the course pages. In addition, links to critical reference materials will also be provided.