University of Cincinnati Logo

20-CS-5155 - Cyber Defense Overview

Electrical and Computer Engineering
Computer Science


John Franco

Registration Data

Credit Level: Undergraduate Credit Hrs: 3.00
Any one of the following is sufficient:
    1.   an undergraduate curriculum in computer science, computer engineering, or electrical engineering up to senior year;
    2.   permission of the instructor.


Course Description

Hands-on treatment of techniques for hardening computer systems and components against attacks, principally via the internet, and for controlling damage and possibly launching countermeasures in case of attack. Specifically, the following are considered:

  • network security techniques and kinds of attacks
  • firewalls
  • intrusion detection
  • intrusion prevention
  • cryptography
  • signature-based malicious code identification
  • defense-in-depth
  • distributed/cloud computing
  • identification of reconnaissance operations
  • anomaly detection and identification
  • malicious activity detection
  • identification of command and control operations
  • trust relationships
  • virtualization
  • system security architectures
  • multiple independent levels of security
Describe, evaluate, and operate defense network architecture employing multiple layers of software and data protection (MILS) using technology appropriate for secure mission accomplishment


Confidentiality, Message Integrity, Authentication, Public Key Encryption, Secret Key Encrption, Block Cipher, Diffie-Hellman Key Exchange, RSA, Password Authentication, AES, RSA, Key Distribution Center, Certification Authority, Kerberos, HMAC, Public Key Infrastructure, Kill Chain Attack Model, Monitoring Systems, Bro Network Security Monitor, Firewalls, Routers, Email Servers, Event-driven Host Monitors, Virtual Private Network, Digital Rights Management, Intrusion Detection, Malware Analysis, Anomaly Detection, CRITs Intelligence Database, Virtualization.

Paul Erdos
Ladies on Campus
Oscar Robinson