Undergraduate Admission
    Graduate Admission

    Master of Cyber Forensics and Security

    Couse Descriptions

    ITMO 456 - Introduction to Open Source Operating Systems
    Students learn to set up and configure an industry-standard open source operating system, including system installation and basic system administration. Also addressed are applications and graphical user interfaces as well as support issues for open source software. (2-2-3) Prerequisite: Corequisite: None
    ITMS 518 - Coding Security
    This course examines security architecture elements within modern object-oriented programming languages that create the framework for secure programming. Analysis of components and services with their inherent strength and weaknesses give rise to common coding security challenges. An exploration of identity management, encryption services and common hacking techniques will enable the student to evaluate the level of a systems data exposure. Coding Standards, best practices, guidelines and style will further enhance the student's ability to develop secure code. Homework assignments and a final project will reinforce the theories taught. A final project involves design and implementation of a secure product. (2-1-3) Prerequisite: [(ITMD 411)] Corequisite: None
    ITMS 528 - Database Security
    Students will engage in an in-depth examination of topics in data security including security considerations in applications & systems development, encryption methods, cryptography law and security architecture & models. (3-0-3) Prerequisite: [(ITMD 421)] Corequisite: None
    ITMS 538 - Cyber Forensics
    This course will address methods to properly conduct a computer and/or network forensics investigation including digital evidence collection and evaluation and legal issues involved in network forensics. Technical issues in acquiring court-admissible chains-of-evidence using various forensic tools that reconstruct criminally liable actions at the physical and logical levels are also addressed. Technical topics covered include detailed analysis of hard disks, files systems (including FAT, NTFS and EXT) and removable storage media; mechanisms for hiding and detecting hidden information; and the hands-on use of powerful forensic analysis tools. (2-2-3) Prerequisite: None Corequisite: None
    ITMS 539 - Steganography
    Digital steganography is the science of hiding covert information in otherwise innocent carrier files so that the observer is unaware that hidden information exists. This course studies both digital steganography and digital steganalysis (the science of discovering the existence of and extracting the covert information). In addition to understanding the science and the pathologies of specific carriers and hiding algorithms, students will have hands-on experience with tools to both hide and extract information. Carrier files such as image, audio and video files will be investigated. (0-0-3) Prerequisite: [(ITMS 538)] Corequisite: None
    ITMO 543 - Vulnerability Analysis and Control
    This course addresses hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers including the networks themselves, operating systems and important applications. Integrated with the lectures are laboratories focusing on use of open source and freeware tools; students will learn in a closed environment to probe, penetrate and hack other networks. (2-2-3) Prerequisite: [(ITMO 440) OR (ITMO 540)] Corequisite: None
    ITMS 548 - Cyber Security Technologies
    Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a fully operational security system in a follow-on course. (2-2-3) Prerequisite: [(ITMO 440) OR (ITMO 540)] Corequisite: None
    ITMS 549 - Cyber Security Technologies: Projects & Advanced Methods
    Prepares students for a role as a network security analyst and developer and gives students experience in developing a production security system. Topics may include computer and network forensics, advances in cryptography and security protocols and systems; operating system security, analysis of recent security attacks, vulnerability and intrusion detection, incident analysis, and the design and development of secure networks. This course includes a significant real world team project the results in a fully operational security system. Students should have previous experience with object-oriented and/or scripting languages. (2-2-3) Prerequisite: [(ITMS 448) OR (ITMS 548)] Corequisite: None
    ITMS 555 - Intelligent Device Technologies
    Intelligent device application development is covered with various technologies on mobile and robotic platforms. Utilizing contemporary toolkits, the student considers design and development on emulated and real "smart" devices including smart phones, personal digital assistants, sensors, actuators and robots. Numerous exercises reinforce concepts gained throughout the course. A term project will integrate course topics into a comprehensive intelligent device application. This course may be taken more than once but only 6 hours of ITMD 455/555 credit may be applied to a degree. (2-2-3) Prerequisite: [(ITMS 538)] Corequisite: None
    ITMS 558 - Operating System Security
    This course will address theoretical concepts of operating system security, security architectures of current operating systems, and details of security implementation using best practices to configure operating systems to industry security standards. Server configuration, system-level firewalls, file system security, logging, anti-virus and anti-spyware measures and other operating system security strategies will be examined. (2-2-3) Prerequisite: [(ITMO 301) OR (ITMO 302)] Corequisite: None
    ITMS 578 - Cyber Security Management
    In-depth examination of topics in the management of information technology security including access control systems & methodology, business continuity & disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security and security architecture & models using current standards and models. (3-0-3) Prerequisite: None Corequisite: None
    ITMS 579 - Topics in Cyber Security
    This course will cover a particular topic in information security, varying from semester to semester, in which there is particular student or staff interest. This course may be taken more than once but only 9 hours of ITMS 479/579 credit may be applied to a degree. (Credit: Variable) Prerequisite: None Corequisite: None
    ITMM 585 - Legal and Ethical Issues in Information Technology
    Current legal issues in information technology are addressed including elements of contracting, payment systems and digital signatures, privacy concerns, intellectual property, business torts and criminal liability including hacking, computer trespass and fraud. Examination of ethical issues including privacy, system abuse, and ethical practices in information technology equip students to make sound ethical choices and resolve legal and moral issues that arise in information technology. (3-0-3) Prerequisite: None Corequisite: None
    ITMM 586 - Information Technology Auditing
    Industry standard practices and standards in the auditing of information technology in an organization are addressed, with a particular emphasis on examination of IT governance, assets, controls and control techniques. Specific areas covered will include the audit process; IT governance; systems and infrastructure life cycle management; IT service delivery and support; protection of information assets; and business continuity and disaster recovery. Students will examine case studies and complete hands-on exercises. (3-0-3) Prerequisite: None Corequisite: None
    ITMS 588 - Incident Response, Disaster Recovery, and Business Continuity
    Students learn to design and manage key business information security functions including incident response plans and incident response teams disaster recovery plans; and business continuity plans. Reporting, response planning and budgeting are all addressed. Students working in reams will prepare an incident response, disaster recovery, or business continuity plan for a real-world organizations such as a business or a government body or agency. (3-0-3) Prerequisite: None Corequisite: None
    ITMT 594 - Special Projects in Information Technology Management
    Capstone project. (Credit: 1 to 6) Prerequisite: written consent of instructor Corequisite: None
    LAW 240 - National Security Law
    See the IIT Chicago-Kent College of Law for the description.
    LAW 273 - Evidence
    See the IIT Chicago-Kent College of Law for the description.
    LAW 478 - Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations
    See the IIT Chicago-Kent College of Law for the description.
    LAW 495 - Electronic Discovery
    See the IIT Chicago-Kent College of Law for the description.
    Last modified: Mar. 06, 2012