Curriculum

Illinois' CNSS IA Certifications

The Information Assurance Courseware Evaluation (IACE) Review Committee certified that University of Illinois courseware maps 100% to the Committee on National Security Systems (CNSS) National Training Standards 4011 (for Information Systems Security (INFOSEC) Professionals, NSTISSI-4011) and 4013A (for System Administrators (SA), CNSSI-4013 Advanced Level). The IACE Program provides consistency in training and education for the information assurance skills that are critical to our nation.

Degree Programs

Degrees related to information security can be pursued in the departments of Computer Science and Electrical & Computer Engineering and in the School of Information Sciences. Further information is available on their departmental websites:

Illinois Courses in Information Security and Cyber Defense

100-, 200-, and 300-level courses are for undergraduates; 400-level courses can be taken by either undergraduate or graduate students; 500-level courses are for graduate students.

Click through the links for information on current and recent offerings of each course.

Illinois Technical Courses Related to Information Security/Cyber Defense

  • CS 241 (System Programming): introduces threat, access controls, and vulnerabilities.
  • CS 411 (Database Systems): focuses on the design, implementation, and optimization of query languages; security and integrity; concurrency control, and distributed systems.
  • CS 412 (Introduction to Data Mining): focuses on the design and implementation of data warehouse and online analytical processing (OLAP).
  • CS 423 (Operating Systems Design): introduces protection, encryption, threat, policy, and coding practices.
  • CS 425/ECE 428 (Distributed Systems): covers credentials and encryption/decryption algorithms.
  • CS 427 (Software Engineering I): introduces planning and good coding practices.
  • CS 428 (Software Engineering II): introduces access controls, secure protocols, and secure code.
  • CS 436/ECE 435 (Computer Networking Laboratory): focuses on design, application, analysis, and deployment of communication protocols and system software behind modern cloud/compute/network infrastructures.
  • CS 438/ECE 438 (Communication Networks): covers signatures, encryption/decryption, and protocols.
  • CS 446/ECE 449 (Machine Learning): covers principles and applications of machine learning. 
  • CS 461/ECE 422 (Computer Security I): covers ethics, privacy, notions of threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing, among other topics.
  • CS 463/ECE 424 (Computer Security II): covers program security, trusted base, privacy, anonymity, non-interference, information flow, confinement, advanced auditing, forensics, intrusion detection, key management and distribution, policy composition and analysis, formal approaches to specification and verification of secure systems and protocols, and topics in applied cryptography.
  • CS 465 (User Interface Design): covers fundamental principles of user interface design, implementation, and evaluation.  
  • CS 439/ECE 439 (Wireless Networks): offers an overview of wireless network architectures. Topics covered include mechanisms for improving performance and security in wireless networks. 
  • CS 498 AC & AM, and ECE AC (Applied Cryptography): introduces concepts of modern cryptography, including a combination of theoretical foundations and practical techniques. (Click through to information on currently available CS 498 sections.)
  • CS 498 CD (Cyber Dystopia): focuses on the downsides of technical progress, including prediction of the future and steps that might avoid the most undesirable outcomes. (Click through to information on currently available CS 498 sections.)
  • CS 498 IT (Internet of Things): teaches a deep understanding of IoT technologies from the ground up. (Click through to information on currently available CS 498 sections.)
  • CS 498 LB (Trustworthy Machine Learning): discusses the foundation of machine learning, optimization algorithms, and deep learning models; introduces different attack approaches against various learning models; and then discusses potential defense strategies, principles against different attacks, and how to protect data privacy to improve data utility for large-scale learning systems in adversarial environments.  (Click through to information on currently available CS 498 sections.)
  • CS 498 SM (Principles of Safe Autonomy): introduces key algorithms and techniques for building powerful autonomous systems. (Click through to information on currently available CS 498 sections.)
  • CS 511 (Advanced Data Management): addresses concepts in data management and information system design and implementation, and recent developments in the field.
  • CS 512 (Data Mining Principles): addresses data cleaning and integration; descriptive and predictive mining, mining frequent, sequential, and structured patterns; clustering, outlier analysis and fraud detection; stream data, web, text, and biomedical data mining; security and privacy in data mining.
  • CS 523 (Advanced Operating Systems): addresses non-repudiation, authentication, delegation, and confidentiality.
  • CS 563/ECE 524 (Advanced Computer Security): addresses current research trends in computer and network security.
  • CS 591 RHC (Security Reading Seminar)(Click through to information on currently available CS 591 sections.)
  • CS 598 AB (Computer Security in the Physical World): examines recent work in security that influences a wide variety of physical world phenomena. (Click through to information on currently available CS 598 sections.)
  • CS/ECE 598 AM (Cryptocurrency Security): introduces students to current research in cryptocurrencies; includes hands-on practice with cryptocurrency tools. (Click through to information on currently available CS 598 sections.)
  • CS 598 AST (Advanced Software Testing and Debugging): teaches the principles and practices of software testing and debugging; topics include security. (Click through to information on currently available CS 598 sections.)
  • CS 598 BL (Adversarial Machine Learning): surveys vulnerabilities in machine learning algorithms and algorithmic techniques that yield more robust learning. (Click through to information on currently available CS 598 sections.)
  • CS 598 CG (Security & Privacy for Home IoT): explores the security and privacy ramifications of IoT devices, covering both issues with the devices themselves and their broader ecosystem of smartphones and cloud systems. (Click through to information on currently available CS 598 sections.)
  • CS 598 CLF (Secure Processor Design): examines the interplay among hardware, software, and applied cryptography in secure processor architectures. (Click through to information on currently available CS 598 sections.)
  • CS 598 DK (Cryptography): covers a selection of such cutting-edge topics in modern cryptography.    (Click through to information on currently available CS 598 sections.)
  • CS 598 GW (Machine Learning for Sys, Networks, and Security): examines the most creative and "crazy" ideas of applying machine learning to solve system and security problems.  (Click through to information on currently available CS 598 sections.)
  • CS 598 LR (Consensus Algorithms): covers classic results and recent advances in consensus algorithms. (Click through to information on currently available CS 598 sections.
  • CS 598 MAN (Applied Cryptography): provides theoretically sound foundation in applied cryptography to see fundamental cryptographic notions and how cryptographic primitives can be used to create applications with security guarantees. (Click through to information on currently available CS 598 sections.)
  • CS 598 OSS (Operating System Security): provides an in-depth examination of issues in operating system security. (Click through to information on currently available CS 598 sections.)
  • CS 598 RBO (Antisocial Computing): covers HCI and NLP research on detecting and discouraging abusive behavior on the Internet. (Click through to information on currently available CS 598 sections.)
  • CS 598 TXU (Reliability of Cloud-Scale Systems): teaches the principles and practices of reliability engineering in modern "cloud-scale" systems, and exposes students to research on software and system reliability. (Click through to information on currently available CS 598 sections.)
  • CS 598 TXU (Reliable Software Systems): teaches the principles and practices of building reliable software systems. (Click through to information on currently available CS 598 sections.)
  • ECE 198 YH (Computing Applications of Discrete Mathematics): includes some RSA-related content. (Click through to content on currently available ECE 198 sections.)
  • ECE 365 (Data Science and Engineering): Project-based course focused on exploring and understanding how data are collected, represented and stored, and computed/analyzed upon to arrive at appropriate and meaningful interpretation. 
  • ECE 398 SC (Smart Contracts & Blockchain Security): teaches students how to use cryptographic tools to design secure smart contract applications, and to find & prevent vulnerabilities. (Click through to information on currently available ECE 398 sections.)
  • ECE 498 ICC (IoT and Cognitive Computing): includes coverage of security and privacy topics. (Click through to information on currently available ECE 498 sections.)
  • ECE 498 KL (eCrime & Internet Serv Abuse): covers the techniques profit-motivated miscreants use to compromise and abuse computer systems. (Click through to information on currently available ECE 498 sections.)
  • ECE 498 SM (Principles of Safe Autonomy): introduces techniques for building autonomous systems and performing their safety analysis. (Click through to information on currently available ECE 498 sections.)
  • ECE 542/CS 536 (Design of Fault-Tolerant Digital Systems): covers advanced concepts in hardware and software fault tolerance.
  • ECE 573 (Power System Control): covers energy control center functions, state estimation and steady state security assessment techniques, economic dispatch, optimal power flow, automatic generation control, and dynamic equivalents. 
  • ECE 598 HH & HHO (Wireless Networks & Mobile Systems): introduces students to advanced research topics in wireless networks and mobile communication systems, including security. (Click through to information on currently available ECE 598 sections.)
  • ECE 598 MS (Advanced Memory and Storage Systems): includes content on storage security and reliability. (Click through to information on currently available ECE 598 sections.)
  • ECE/CS 598 NB (Privacy Enhancing Technologies): reviews foundational and recent research results in the field of privacy-enhancing technologies. (Click through to information on currently available ECE 598 sections.)
  • ECE 598 PV (Principles of Blockchains): introduces blockchains, with a concrete application focus on payment systems. (Click through to information on currently available ECE 598 sections.)
  • ECE 598 RKI (Dependable AI Systems): addresses the challenge of design, implementation, and validation of dependable AI systems by studying new challenges imposed by classic as well as emerging AI algorithms, decision-making under uncertainty, and the consequent safety, reliability, and security issues. (Click through to information on currently available ECE 598 sections.)

Illinois Non-technical Courses Related to Information Security/Cyber Defense