Nondegree students register through Continuing Education’s ACCESS program (Fall/Spring term). Students pay ACCESS tuition rates. Nondegree students enrolling through ACCESS may be eligible for Continuing Education scholarships.
- Complete and submit the Online Enrollment Application for Continuing Education. You will receive an email with your student ID number and instructions on how to enroll.
- Enroll for classes through ACCESS. Students must wait until the Friday before classes begin each semester to enroll through ACCESS.
For additional course information, search "CYBR" at classes.colorado.edu.
Combining conceptual knowledge about data communications and core Internet technologies with hands-on labs that reinforce the conceptual knowledge, this course provides students with the ability to create innovative technology solutions in their discipline. Learning how the Internet works and being able to evaluate and operate an Internet network is a valuable skill; students in this course will have a competitive advantage in this foundational field.
Emphasis on the IEEE P802.11 family of WLAN standards. Students learn the legacy versions of the standard (802.11DS/b), the current generation of WLAN systems (802.11a/g/n/ac), and will to analyze and critique upcoming versions (802.11ax/ba), and gain insight into proposals for new research in WLAN. Exposure to the interoperability and certification process for WLAN by the Wi-Fi Alliance, study the newest Wi-Fi Certified™ programs, and will learn how to model and analyze WLAN traffic using industry standard tools.
Introduces core concepts in cybersecurity including confidentiality, integrity, authentication, risk management, and adversarial thinking. The concepts will be applied to both traditional information technology (IT) systems and cyber physical systems (CPS). The course provides a cyber security foundation that will allow practitioners in other fields apply to understand cyber security trade-offs and will also provide interested students with a basis further study in cyber security. At the conclusion of the course, students should have a solid foundation in cybersecurity and hands-on experience.
This course takes a hands-on approach to detecting malicious activity within network traffic. The course will first introduce methodologies for analyzing cyber data. This knowledge will then be used practically, as the students will be given the chance to test out approaches on real traffic. At the conclusion, students will have both a theoretical understanding of cyber algorithms and their use in a real-world setting. Recommended requisite: C++ and Linux/Unix experience and knowledge of computer networking.
Learn how to identify, collect, examine, analyze, and present digital evidence and the legal challenges associated with conducting digital forensics investigations. Explore various file system types and structures. Learn how to recovery and extract potential evidence from deleted files and directories. Learn how to capture and profile data residing in live memory. Analyze running processes and recover memory artifacts. Learn about various methods data can be hidden on a computing devices, storage media, and within covert communications channels. Recommended prerequisites: CYBR 3300, CYBR 5300, CSCI 3403 or CSCI 5403.
This course is an introduction to the principles and techniques associated with security auditing and penetration testing. Topics covered include; planning, reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting. Students discover how system vulnerabilities can be exploited. Students will develop an understanding of current cybersecurity issues and how user, administrator, and programmer errors can result in security breaches. Recommended prerequisites: CYBR 3300, CYBR 5300, CSCI 3403 or CSCI 5403.
Engage in the critical strategic analysis and debate of controversial public policy issues raised by the Internet. Learn how to develop well-reasoned positions on the regulations applied to new Internet-based technologies and business models based on interdisciplinary frameworks that characterize the significant intersection of technology, economics, business, and public policy. Policy topics covered include Broadband as a Universal Service, Net Neutrality, Spectrum Management, Online Privacy, and Cybersecurity
Designing for Defense/Hacking for Defense is a national service program running at leading research universities across the country. Interdisciplinary teams—chosen by competitive selection—work on real-world national security challenges, in close contact with national security agencies. Teams employ the Lean Launchpad entrepreneurship methodology to develop engineering and business concepts to solve real world challenges for special operations forces, the intelligence community, and other government agencies. Winning teams are eligible for real-world capital investment.
Introduces students to major topics and research at the interface of technology, cybersecurity, and policy by providing a weekly series of lectures with questions and discussion, including guest speakers.
Courses are ran as special topics courses for a few semesters before becoming official CYBR courses. The following courses meet the TCP Advanced Elective Requirements:
Provides a comprehensive, hands-on set of laboratory exercises for the teaching and demonstration of key technical skills required to understand, build, test, and analyze both analog and digital wireless communications concepts. In conjunction with lecture-based content to provide a solid foundation in digital communication theory, SDR-based laboratory exercises enable the synthesis of several fundamental concepts utilizing the latest, modern communications systems technologies.