For additional course information, search "CYBR" at classes.colorado.edu.

Date & Time: MWF 11-11:50am Instructor: David Reed

Combining conceptual knowledge about data communications and core Internet technologies with hands-on labs that reinforce the conceptual knowledge, this course provides students with the ability to create innovative technology solutions in their discipline. Learning how the Internet works and being able to evaluate and operate an Internet network is a valuable skill; students in this course will have a competitive advantage in this foundational field.

Date & Time: TTh 2-3:15pm Instructor: James Lansford

Emphasis on the IEEE P802.11 family of WLAN standards. Students learn the legacy versions of the standard (802.11DS/b), the current generation of WLAN systems (802.11a/g/n/ac), and will to analyze and critique upcoming versions (802.11ax/ba), and gain insight into proposals for new research in WLAN. Exposure to the interoperability and certification process for WLAN by the Wi-Fi Alliance, study the newest Wi-Fi Certified™ programs, and will learn how to model and analyze WLAN traffic using industry standard tools.

Date & Time: TTh 12:30-1:45pm Instructor: Daniel Massey

Introduces core concepts in cybersecurity including confidentiality, integrity, authentication, risk management, and adversarial thinking. The concepts will be applied to both traditional information technology (IT) systems and cyber physical systems (CPS). The course provides a cyber security foundation that will allow practitioners in other fields apply to understand cyber security trade-offs and will also provide interested students with a basis further study in cyber security. At the conclusion of the course, students should have a solid foundation in cybersecurity and hands-on experience.

Date & Time: TTh 11am-12:15pm Instructor: Eric Goodman

This course takes a hands-on approach to detecting malicious activity within network traffic. The course will first introduce methodologies for analyzing cyber data. This knowledge will then be used practically, as the students will be given the chance to test out approaches on real traffic. At the conclusion, students will have both a theoretical understanding of cyber algorithms and their use in a real-world setting. Recommended requisite: C++ and Linux/Unix experience and knowledge of computer networking.

Date & Time: T 3:30-6pm Instructor: Aaron Hansen

Learn how to identify, collect, examine, analyze, and present digital evidence and the legal challenges associated with conducting digital forensics investigations. Explore various file system types and structures. Learn how to recovery and extract potential evidence from deleted files and directories. Learn how to capture and profile data residing in live memory. Analyze running processes and recover memory artifacts. Learn about various methods data can be hidden on a computing devices, storage media, and within covert communications channels. Recommended prerequisites: CYBR 3300, CYBR 5300, CSCI 3403 or CSCI 5403.

Date & Time: Th 3:30-6pm Instructor: Aaron Hansen

This course is an introduction to the principles and techniques associated with security auditing and penetration testing. Topics covered include; planning, reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting. Students discover how system vulnerabilities can be exploited. Students will develop an understanding of current cybersecurity issues and how user, administrator, and programmer errors can result in security breaches. Recommended prerequisites: CYBR 3300, CYBR 5300, CSCI 3403 or CSCI 5403.

Date & Time: MWF 9-9:50am Instructor: David Reed

Engage in the critical strategic analysis and debate of controversial public policy issues raised by the Internet. Learn how to develop well-reasoned positions on the regulations applied to new Internet-based technologies and business models based on interdisciplinary frameworks that characterize the significant intersection of technology, economics, business, and public policy. Policy topics covered include Broadband as a Universal Service, Net Neutrality, Spectrum Management, Online Privacy, and Cybersecurity

Date & Time: Th 5:30-8pm Instructor: Gregory (Lloyd) Thrall

Designing for Defense/Hacking for Defense is a national service program running at leading research universities across the country. Interdisciplinary teams—chosen by competitive selection—work on real-world national security challenges, in close contact with national security agencies. Teams employ the Lean Launchpad entrepreneurship methodology to develop engineering and business concepts to solve real world challenges for special operations forces, the intelligence community, and other government agencies. Winning teams are eligible for real-world capital investment.

Date & Time: W 4:30-5:20pm Instructor: James Curry

Introduces students to major topics and research at the interface of technology, cybersecurity, and policy by providing a weekly series of lectures with questions and discussion, including guest speakers.

Courses are ran as special topics courses for a few semesters before becoming official CYBR courses. The following courses meet the TCP Advanced Elective Requirements:

  • CYBR 5830-003 Special Topics: Intro to Blockchain - Date & Time: W 5:30-8pm Instructor: Hunter Albright
  • CYBR 5830-007 Special Topics: Becoming a Technology Leader - Date & Time: F 4-6:30pm Instructor: Al Pisano
  • CYBR 5830-013 Special Topics: RF Radio Spectrum - Date & Time: MW 4-5:15pm Instructor: Frank Sanders
  • CYBR 5830-014 Special Topics: Security Club Companion Class - Date & Time: M 4-5:15pm Instructor: Walter (Nolen) Scaife
  • CYBR 5830-015 Special Topics: Cybersecurity Auditing - Date & Time: Meets Online Instructor: Daniel Manson
  • CYBR 5830-016 Special Topics: Colorado Politics - Date & Time: Meets Online Instructor: Brandon Shaffer

Date & Time: TTh 9:30-10:45am Instructor: Kevin Gifford

Provides a comprehensive, hands-on set of laboratory exercises for the teaching and demonstration of key technical skills required to understand, build, test, and analyze both analog and digital wireless communications concepts. In conjunction with lecture-based content to provide a solid foundation in digital communication theory, SDR-based laboratory exercises enable the synthesis of several fundamental concepts utilizing the latest, modern communications systems technologies.

Instructor: Kevin Gifford

This two-semester sequence includes CYBR 5700 Graduate Projects I and CYBR 6700 Graduate Projects II. Teaches students how to engineer a complex, inter/multidisciplinary design and implementation problem in a group environment.