Degrees related to information security can be pursued in the departments of Computer Science and Electrical & Computer Engineering and in the School of Information Sciences. Further information is available on their departmental websites:
- Department of Electrical and Computer Engineering: Undergraduate Programs and Graduate Programs
- Department of Computer Science: Undergraduate Programs and Graduate Programs
- School of Information Sciences: Degrees and Programs
Illinois Courses in Information Security and Cyber Defense
100-, 200-, and 300-level courses are for undergraduates; 400-level courses can be taken by either undergraduate or graduate students; 500-level courses are for graduate students.
Click through the links for information on current and recent offerings of each course.
Illinois Technical Courses Related to Information Security/Cyber Defense
- CS 241 (System Programming): introduces threat, access controls, and vulnerabilities.
- CS/ECE 407 (Cryptography): introduces the concepts of modern cryptography.
- CS 411 (Database Systems): focuses on the design, implementation, and optimization of query languages; security and integrity; concurrency control, and distributed systems.
- CS 412 (Introduction to Data Mining): focuses on the design and implementation of data warehouse and online analytical processing (OLAP).
- CS 423 (Operating Systems Design): introduces protection, encryption, threat, policy, and coding practices.
- CS 425/ECE 428 (Distributed Systems): covers credentials and encryption/decryption algorithms.
- CS 427 (Software Engineering I): introduces planning and good coding practices.
- CS 428 (Software Engineering II): introduces access controls, secure protocols, and secure code.
- CS 438/ECE 438 (Communication Networks): covers signatures, encryption/decryption, and protocols.
- CS 441 (Applied Machine Learning): tool-oriented and problem-oriented look at machine learning.
- CS 442 (Trustworthy Machine Learning): prepares students to understand the security and privacy problems in machine learning.
- CS 446/ECE 449 (Machine Learning): covers principles and applications of machine learning.
- CS 461/ECE 422 (Computer Security I): covers ethics, privacy, notions of threat, vulnerabilities and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, and trusted computing, among other topics.
- CS 463/ECE 424 (Computer Security II): covers program security, trusted base, privacy, anonymity, non-interference, information flow, confinement, advanced auditing, forensics, intrusion detection, key management and distribution, policy composition and analysis, formal approaches to specification and verification of secure systems and protocols, and topics in applied cryptography.
- CS 465 (User Interface Design): covers fundamental principles of user interface design, implementation, and evaluation.
- CS 439/ECE 439 (Wireless Networks): offers an overview of wireless network architectures. Topics covered include mechanisms for improving performance and security in wireless networks.
- CS/ECE 498 AC (Applied Cryptography): introduces concepts of modern cryptography, including a combination of theoretical foundations and practical techniques. (Click through to information on currently available CS 498 sections.)
- CS 498 CD (Cyber Dystopia): focuses on the downsides of technical progress, including prediction of the future and steps that might avoid the most undesirable outcomes. (Click through to information on currently available CS 498 sections.)
- CS 498 IT (Internet of Things): teaches a deep understanding of IoT technologies from the ground up. (Click through to information on currently available CS 498 sections.)
- CS 507 (Topics in Cryptography): covers a selection of cutting-edge topics in cryptography.
- CS 511 (Advanced Data Management): addresses concepts in data management and information system design and implementation, and recent developments in the field.
- CS 512 (Data Mining Principles): addresses data cleaning and integration; descriptive and predictive mining, mining frequent, sequential, and structured patterns; clustering, outlier analysis and fraud detection; stream data, web, text, and biomedical data mining; security and privacy in data mining.
- CS 523 (Advanced Operating Systems): addresses non-repudiation, authentication, delegation, and confidentiality.
- CS 562 (Advanced Topics in Security, Privacy, and Machine Learning): covers advanced topics in security and privacy problems in machine learning systems.
- CS 563/ECE 524 (Advanced Computer Security): addresses current research trends in computer and network security.
- CS 598 AST (Advanced Software Testing and Debugging): teaches the principles and practices of software testing and debugging; topics include security. (Click through to information on currently available CS 598 sections.)
- CS 598 BL (Adversarial Machine Learning): surveys vulnerabilities in machine learning algorithms and algorithmic techniques that yield more robust learning. (Click through to information on currently available CS 598 sections.)
- CS 598 CG (Security & Privacy for Home IoT): explores the security and privacy ramifications of IoT devices, covering both issues with the devices themselves and their broader ecosystem of smartphones and cloud systems. (Click through to information on currently available CS 598 sections.)
- CS 598 CTO (Quantum Cryptography): a look at the influence of quantum computing on cryptography. (Click through to information on currently available CS 598 sections.)
- CS 598 DH (Secure Computation): covers secure multiparty computation (MPC). (Click through to information on currently available CS 598 sections.)
- CS 598 FTD (Fault-Tolerant Distributed Algorithms): covers classic results and recent advances in fault-tolerant distributed algorithms. (Click through to information on currently available CS 598 sections.)
- CS 598 GW (Machine Learning for Sys, Networks, and Security): examines the most creative and "crazy" ideas of applying machine learning to solve system and security problems. (Click through to information on currently available CS 598 sections.)
- CS 598 LR (Consensus Algorithms): covers classic results and recent advances in consensus algorithms. (Click through to information on currently available CS 598 sections.
- CS 598 OSS (Operating System Security): provides an in-depth examination of issues in operating system security. (Click through to information on currently available CS 598 sections.)
- CS 598 UCP (Usable Cybersecurity & Privacy): Examines 'usable' security and privacy, which sits at the intersection of human-computer interaction (HCI) and traditional security and privacy (S&P). (Click through to information on currently available CS 598 sections.)
- CS 598 XU (Reliability of Cloud-Scale Systems): teaches the principles and practices of reliability engineering in modern "cloud-scale" systems, and exposes students to research on software and system reliability. (Click through to information on currently available CS 598 sections.)
- ECE 198 YH (Computing Applications of Discrete Mathematics): includes some RSA-related content. (Click through to content on currently available ECE 198 sections.)
- ECE 365 (Data Science and Engineering): Project-based course focused on exploring and understanding how data are collected, represented and stored, and computed/analyzed upon to arrive at appropriate and meaningful interpretation.
- ECE 479 (IoT and Cognitive Computing): Offers in-depth coverage on existing and emerging IoT and cognitive computing topics, including IoT security.
- ECE 484 (Principles of Safe Autonomy): introduces techniques for building autonomous systems such as autonomous cars, delivery drones, and manufacturing robots, and techniques for performing their safety analysis.
- ECE 498 ICC (IoT and Cognitive Computing): includes coverage of security and privacy topics. (Click through to information on currently available ECE 498 sections.)
- ECE 542/CS 536 (Design of Fault-Tolerant Digital Systems): covers advanced concepts in hardware and software fault tolerance.
- ECE 573 (Power System Control): covers energy control center functions, state estimation and steady state security assessment techniques, economic dispatch, optimal power flow, automatic generation control, and dynamic equivalents.
- ECE 598 AM (Ideal Functionalities in Cryptography): explores connections between Universal Composability (UC) in cryptography versus other domains, and considering what UC can offer to software engineers implementing large systems. (Click through to information on currently available ECE 598 sections.)
- ECE 598 HH & HHO (Wireless Networks & Mobile Systems): introduces students to advanced research topics in wireless networks and mobile communication systems, including security. (Click through to information on currently available ECE 598 sections.)
- ECE 598 MS (Advanced Memory and Storage Systems): includes content on storage security and reliability. (Click through to information on currently available ECE 598 sections.)
- ECE 598 PV (Principles of Blockchains): introduces blockchains, with a concrete application focus on payment systems. (Click through to information on currently available ECE 598 sections.)
- ECE 598 RKI (Dependable AI Systems): addresses the challenge of design, implementation, and validation of dependable AI systems by studying new challenges imposed by classic as well as emerging AI algorithms, decision-making under uncertainty, and the consequent safety, reliability, and security issues. (Click through to information on currently available ECE 598 sections.)
- ENG 198 CYB (Introduction to Cybersecurity): explores the dynamics of cybersecurity, practical implications, and marketplace impact; designed for engineering and CS students who would like to better understand how their skills might be applied to cyber risk mitigation. (Click through to information on currently available ENG 198 sections.)
- ENG 498 FSN (Foundations in Secure Networking for Cyber-Social Systems) covers both the technical concepts and the organizational and human issues related to secure networking, including their design, implementation, and administration. (Click through to information on currently available ENG 498 sections.)
Illinois Non-technical Courses Related to Information Security/Cyber Defense
- BADM 458 (IT Governance): provides a core body of knowledge on the state of development, research, and business practice of IT governance.
- BADM 559 (Enterprise IT Governance): addresses enterprise IT governance.
- CS 210 (Ethical and Professional Issues in CS): introduces ethics for the computing profession.
- CS 211 (Ethical and Professional Conduct): introduces the complex ethical and professional landscape of the computing profession.
- CS 464 (Topics in Societal and Ethical Impacts of Computer Technology): examines areas in which computer technology intersects with society and ethics.
- CS 498 AS (Anti-Social Computing): explores recent advances in detecting and discouraging antisocial behavior on the Internet. (Click through to information on currently available CS 498 sections.)
- CS 498 RC (Law & Policy Issues in CS): examines how computing technology is regulated in areas such as privacy, crime, intellectual property, commerce, and national security. (Click through to information on currently available CS 498 sections.)
- CS 598 CAC (Inclusive Cybersecurity & Priv): looks at different security and privacy requirements of non-majority people. (Click through to information on currently available CS 598 sections.)
- CS 598 ECH or RBO (Antisocial Computing): covers HCI and NLP research on detecting and discouraging abusive behavior on the Internet. (Click through to information on currently available CS 598 sections.)
- ECE 316 (Ethics and Engineering): studies ethical issues in the practice of engineering.
- EPOL 480 (Technology & Educational Reform): examines the normative and policy issues raised by the use of new information and communication technologies in education.
- GLBL 228/HIST 257 (Terrorism, Past and Present): explores the history of terrorism, its goals and practices.
- GLBL 480/NPRE 480/PS 480 (Energy and Security): examines issues related to the security and supply of energy, mineral resources, and water.
- GLBL 483/NPRE 483 (Seminar on Security): consists of a set of introductory lectures and selections from various on-campus seminar series relevant to the technology of domestic and international security and the regional and international contexts that influence the nature of security problems.
- INFO 202/IS 202/MACS 202 (Social Aspects of Information Technology): explores how information technologies transform society and how they affect a range of social, political, and economic issues from the individual to societal levels.
- INFO 390 JB (Information Security & Global Society): focuses on the interrelationship between information, the privacy and security concerns that come with digitization, and global society at large. (Click through to information on currently available INFO 390 sections.)
- IS 334 (Usable Privacy and Security): introduces various aspects of user experience (e.g., usability problems, user interface designs, conflicting needs) related to privacy and security systems.
- IS 364 (Privacy and Info Technology): introduces data privacy to a wide audience.
- IS 424 (Social Computing): introduces students to fundamental theories, methods, technologies and applications of social computing. Covers a broad range of topics, including privacy and security.
- IS 464 (Information Assurance): provides an introduction to the concepts, technologies, practices and challenges of information assurance.
- IS 467 (Ethics and Policy for Data Science): addresses common ethical challenges related to data including privacy, bias, and data access.
- IS 524 (Data Governance): addresses issues of data governance, including data ethics, and design and implementation of policy responses and best practices.
- IS 584 PVO (Privacy in the Internet Age): examines the notion of privacy in relation to existing and projected information/communication technologies and institutional arrangements. (Click through to information on currently available IS 584 sections.)
- IS 590 ET or IS 584 IEO (Information Ethics): introduces students to major ethical theories and their application to information and information technologies. (Click through to information on currently available IS 590 sections and currently available IS 584 sections.)
- IS 594 CDO (Community Data): examines claims about data-driven technologies that have been projected as “solutions” to community problems. (Click through to information on currently available IS 594 sections.)
- Law 601 (Contracts): studies the enforceability of promises.
- Law 644 (Copyright Law): offers an in-depth look at the legal aspects of copyright with special emphasis on application of principles to new technologies and media.
- PS 387 (National Security Policy): examines principal theories of international security and evaluates their capacity to explain the security behavior of states and other key international actors.
Illinois' CNSS IA Certifications
The Information Assurance Courseware Evaluation (IACE) Review Committee certified that University of Illinois courseware maps 100% to the Committee on National Security Systems (CNSS) National Training Standards 4011 (for Information Systems Security (INFOSEC) Professionals, NSTISSI-4011) and 4013A (for System Administrators (SA), CNSSI-4013 Advanced Level). The IACE Program provides consistency in training and education for the information assurance skills that are critical to our nation.