Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

Curriculum

Illinois' CNSS IA Certifications

The Information Assurance Courseware Evaluation (IACE) Review Committee certified that University of Illinois courseware maps 100% to the Committee on National Security Systems (CNSS) National Training Standards 4011 (for Information Systems Security (INFOSEC) Professionals, NSTISSI-4011) and 4013A (for System Administrators (SA), CNSSI-4013 Advanced Level). The IACE Program provides consistency in training and education for the information assurance skills that are critical to our nation. 

Degree Programs

Degrees related to information assurance can be pursued in the departments of Computer Science and Electrical & Computer Engineering. Further information is available on the departmental websites:

Course Concentrations in IA

(See also the ITI Security Roadmap)

Undergraduate Courses

  • CS 210 (Ethical and Professional Issues in CS) or ECE 316 (Engineering Ethics).
  • CS 241 (System Programming) or ECE 390 (Computer Engineering II).
  • CS 460/ECE 419 (Security Laboratory): covers access controls, secure protocols, and policies.
  • CS 461/ECE 422 (Computer Security I): covers ethics, privacy, notions of threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.
  • CS 463/ECE 424 (Computer Security II): covers threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.

Graduate Courses

  • CS 463/ECE 424 (Computer Security II): covers threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.
  • CS 563/ECE 524 (Advanced Computer Security): covers threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.

Illinois Technical Courses Related to IA

  • CS 241 (System Programming): introduces threat, access controls, and vulnerabilities.
  • CS 411 (Database Systems):  focuses on the design, implementation, and optimization of query languages; security and integrity; concurrency control, and distributed systems.
  • CS 412 (Introduction to Data Mining): focuses on the design and implementation of data warehouse and online analytical processing (OLAP).
  • CS 423 (Operating Systems Design): introduces protection, encryption, threat, policy, and coding practices.
  • CS 425/ECE 428 (Distributed Systems): covers credentials and encryption/decryption algorithms.
  • CS 438/ECE 438 (Communication Networks): covers signatures, encryption/decryption, and protocols.
  • CS 427 (Software Engineering I): introduces planning and good coding practices.
  • CS 428 (Software Engineering II): introduces access controls, secure protocols, and secure code.
  • CS 498 (Digital Forensics):  focuses on acquisition and investigation of evidence from all devices capable of storing digital data related to the prosecution of cyber crime and fraud.
  • CS 511 (Advanced Data Management):  addresses concepts in data management and information system design and implementation, and recent developments in the field.
  • CS 512 (Data Mining Principles):  addresses data cleaning and integration; descriptive and predictive mining, mining frequent, sequential, and structured patterns; clustering, outlier analysis and fraud detection; stream data, web, text, and biomedical data mining; security and privacy in data mining.
  • CS 523 (Advanced Operating Systems): addresses non-repudiation, authentication, delegation, and confidentiality.
  • CS 591 RHC (Advanced Seminar in CS): topics "Security/Information Assurance/Cyber Security".
  • CS 598 MAN (Applied Cryptography): provides theoretically sound foundation in applied cryptography to see fundamental crypographic notions and how crytographic primitives can be used to create applications with security guarantees.
  • ECE 559 (Topics in Communications): covers advanced topics and new areas of interest in the theory of communication sysystems, information theory, coding theory, and communication network theory.
  • ECE 598 NB (Privacy Enhancing Technologies).
  • BADM 395-MS1/BA590-MS (Trustworthy Computing: Information Security and Management): covers integrity, privacy, ethics, risk management, and reliability.

Illinois Non-technical Courses Related to IA

  • ECE 316 (Engineering Ethics).
  • CS 210 (Ethical and Professional Issues in CS).

Information Sciences

  • LIS 390EC (Ethics in Cyberspace).
  • LIS 490IE (Information Ethics).

Educational Policy Studies

  • EPS 415 (Information Technology Ethics).

Law

  • Law 644 (Copyright Law).
  • Law 646 (Cyberspace Law).
  • Law 601 (Contract Law).
  • Law 798 (Privacy Issues).

Online Courses

Three of the Information Assurance courses are available to the online Professional Master's students in Computer Science at the University of Illinois. The courses are offered through an online section where students watch the lecture on video and complete the same assignments/projects/exams as the on-campus student.  All interaction with other students, professor, and teaching assistant are done through Skype, email, chat rooms, etc.  In addition, working professionals who hold a bachelor's degree can take these courses as a "Non-Degree" student and earn a certificate in security.   

  • CS 461 (Computer Security I): covers ethics, privacy, notions of threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.
  • CS 463 (Computer Security II): covers threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.
  • CS 563 (Advanced Computer Security): covers threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing.