CYBR 240: Cyber Defense and Offense


Course Description | Administration | Learning Objectives | Course Material and Topics | Grading and Attendance Policy | Exams | Assignment Guidelines | Academic Honesty | Accomodation for Students with Disabilities | Nondiscrimination Policy

Course Description

This course offers a comprehensive study of the principles and practices of computer system security including operating system security, network security, software security, and web security. Students will learn common threats and vulnerabilities, along with basic principles and techniques when designing a secure system. Hands-on labs will help students gain an understanding on how to think like an adversary, how modern cyber-attacks and defenses work in practice, and how to assess threats and protection mechanisms.

Prerequisites: ECPE 170 or completion of “Low-level Programming”; COMP 177, ECPE 177 or completion of “Computer Networking” all with a “C” or better.
When enrolling in this course, you should be relatively proficient in networking concepts, including software and hardware both on your computer and elsewhere on the network. Moreover, you should have working uderstanding of low-level and high-level programming languages (e.g., Assembly, C, C++, Java, and Python).

Website: Syllabus, Cyberlab, Canvas LMS

Credits: 3 units

Course Catalog: http://catalog.pacific.edu/search/?P=CYBR%20240




Administration

Instructor: Sepehr Amir-Mohammadian
Email: [at] (samirmohammadian) ([dot] (pacific) (edu))
Lecture: TR 10:00AM - 11:20AM, CTC 214
Office hours: TR 1:00PM - 3:00PM, CTC 118
Students need to request alternate meeting times outside of scheduled office hours through email.



Learning Objectives

The MS in Cybersecurity program has identified eleven program learning outcomes that are satisfied by required courses. These program learning outcomes, and the level at which each course satisfies them, is identified in the following table.
Course CYBR 200 CYBR 210 CYBR 220 CYBR 230 CYBR 240 CYBR 250 CYBR 280
Low Level Programming Languages D
M M


Software Reverse Engineering

M



Operating System Theory D



M
Networking


M


Cellular and Mobile Technologies


M


Discrete Math and Algorithms M


M

Cyber Defense D


M

Security Fundamental Principles D





Vulnerabilities
M




Cybersecurity Law




M
Communication Skills
D


M

D = Developed (learning outcome developed through multiple assignments with extensive feedback)
M = Mastered (learning outcome mastered through a robust assignment; appropriate for graduation)
Note: CYBR 280 (Cyber Security Capstone Project): This student project must demonstrate mastery in at least five different cybersecurity competencies (including cybersecurity law and communication skills)


After taking this course, you should be able to:




Course Material and Topics

No textbook is required for this course. Optional reference books may be suggested throughout the semester, and I welcome feedback on any online/print references you find useful!

The course topics are as follows:




Grading and Attendance Policy

Grades for the course are assigned on the scale below:
A A- B+ B B- C+ C C- D+ D F
[93,100] [90,93) [87,90) [83,87) [80,83) [77,80) [73,77) [70,73) [67,70) [60,67) [0,60)

Final grades will be assigned based on several performance factors. These factors and their quantitative contribution to the final grade are as follows:

Attendance: Class attendance and participation is necessary and expected. There will be numerous activities in class, and these activities cannot be made up outside of class. Participation requires that you are properly prepared for classroom discussions and activities. The only acceptable excuses for missing a class, an assignment due date, or an exam are serious illness, family emergency or important professional, academic or athletic activities. Illness or family emergency may require documentation. Excuses for professional, academic or athletic activities must be approved by the instructor in advance. Students missing a class are responsible for making up the material discussed in that class on their own. Students are responsible for being aware of any announcements made during their absence.




Exams

Two exams will be conducted during the semester, a midterm and a final. The schedule will be announced in class and content and format will be discussed prior to the exams. Make up exams will only be scheduled in emergency situations.




Assignment Guidelines

Release and Submission: Project descriptions, technical report and presentation requirements will be released on the course Canvas page with a clearly indicated due date. Submissions are accepted until 11:59PM on the due date.

Late policy: Deliverables will be accepted up to three weekdays late, with a 10% per day penalty.
All assignments will be considered individual efforts unless otherwise specified, and will be treated as such under the Academic Honesty Policy.




Academic Honesty

The Honor Code at the University of the Pacific calls upon each student to exhibit a high degree of maturity, responsibility, and personal integrity. Students are expected to:

Violations will be referred to and investigated by the Office of Student Conduct and Community Standards. If a student is found responsible, it will be documented as part of her or his permanent academic record. A student may receive a range of penalties, including failure of an assignment, failure of the course, suspension, or dismissal from the University. The Academic Honesty Policy is located in Tiger Lore and online.

Course-specific Honor Code Policy: Engineering is generally a cooperative endeavor and collaborative learning can be a valuable experience for all involved. However, proper assessment (i.e., grading) requires that work be done by individuals. To balance these two requirements, the following policy will apply:

Marginal cases will be resolved by oral examination of the student(s) involved. If they each understand the material in the assignment, it will be considered honest collaboration. If they do not, then it will be considered academic dishonesty.

In many cases, it may be possible to identify reusable source code from textbooks, web sites or other resources that can help you with assignments. You are permitted to use such references provided that:

You are responsible for understanding the theory behind all algorithms or source code used, regardless of their source.


Accommodations for Students with Disabilities

If you are a student with a disability who requires accommodations, please contact the Director of the Office of Services for Students with Disabilities (SSD) for information on how to obtain an Accommodations Request Letter.

3-Step Accommodation Process:

To ensure timeliness of services, it is preferable that you obtain the accommodation letter(s) from the Office of SSD during the first week of class. After the instructor receives the accommodation letter, please schedule a meeting with the instructor during office hours or some other mutually convenient time to arrange the accommodation(s).

The Office of Services for Students with Disabilities is located in the McCaffrey Center, Rm. 137.


Nondiscrimination Policy

The University of the Pacific does not discriminate in the administration of any of its educational programs, admissions, scholarships, loans, athletics, or other University activities or programs on the basis of race, color, national and ethnic origin, handicap, sexual orientation or preference, sex or age.


The instructor reserves the right to change these policies and guidelines at any time, and students agree to abide by the most recent version of this syllabus.


Back to top