Course's Description

AV-610 Linear Systems Theory

The course covers following topics. Linear spaces and linear operators. Bases, subspaces, eigenvalues and eigenvectors, canonical forms. Linear differential and difference equations. Mathematical representations: state equations, transfer functions, impulse response, matrix fraction and polynomial descriptions. System-theoretic concepts: causality, controllability, observability, realizations, canonical decomposition, stability, introduction to optimal control and the Kalman filter.

AV-611 Linear Multivariable Feedback Control Systems

Control design concepts for linear multivariable systems, System Modeling, Design of feedback controllers, Full Order Observer design, Internal Stability, Transfer functions and closed loop stability, Closed Loop Design Specifications, Sensitivity to Plant Model Uncertainty, The Bode Loop Shaping, Multivariable (MIMO) Closed Loop system representations, Observer Based Compensator, Multivariable Integral Control, Feasibility for MIMO systems, Bias Estimation & Integral Control, LQR Controller, Kalman filter as an optimal estimator, Time Domain Design Limitations, Frequency Domain Design Specifications, Robust Stability, MIMO Generalization of the Stability Robustness, Singular Values and Feedback Control, Classical properties of LQ regulators, The MIMO Root Locus.

AV-620/IS-620 Random Processes

Topics include probability axioms, sigma algebras, random vectors, expectation, probability distributions and densities, Poisson and Wiener processes, stationary processes, autocorrelation, spectral density, effects of filtering, linear least-squares estimation, and convergence of random sequences.

AV-621/IS-720 Digital Signal Processing

Introduction to digital signal processing of continuous and discrete signals. The family of Fourier Transforms including the Discrete Fourier Transform (DFT). Development of the Fast Fourier Transform (FFT). Signal sampling and reconstruction. Design and analysis of digital filters. Correlation and spectral estimation. Estimators of second order properties of random processes: nonparametric and model-based techniques of spectral estimation.

AV-626 Digital Communications

This course covers Sampling, Pulse Code Modulation, Pulse Amplitude Modulation, Pulse Position Modulation, Time Division Multiplexing, Digital Pass band Modulation: Gram Schmidt Orthogonalization Procedure, Geometric representation of signals , Noise: Additive Gaussian white and colored noise, multiplicative noise , Receivers: Optimal Receiver in AWGN (ML Receiver), sub-optimal Receivers, Matched Filter Receiver, Receiver Performance, Performance comparison of modulation schemes, Probability of Error, Coherent modulation schemes: BFSK, BPSK, Binary Amplitude shift keying: BASK, M-ary modulation schemes, Performance comparison of modulation schemes in AWGN, Non-Coherent Digital Modulation Schemes, Non-Coherent ML Receiver, Non-Coherent BPSK, Non-Coherent BFSK, Non-Coherent BASK, Synchronization and Symbol Timing Recovery, Digital Communication through band limited channels: ISI, Optimum receiver with ISI, Equalization.

AV-630 Wireless Communications I

This course covers Overview of wireless communication, Cellular concepts & cellular standards, Channel Modeling - Path loss & Large-scale propagation, Channel Modeling – Small Scale Fading, Modulation techniques, Error Correction Coding, Multiple Access (MA) Techniques , Spread spectrum (SS), Direct Sequence Spread spectrum (DSSS), Frequency Hopping Spread spectrum (FHSS), Direct Sequence Code Division Multiple Access (DS-CDMA).

AV-632/IS-730 Software Engineering

The goal of software engineering is to control the quality of software by following engineering principles during development. In the practical aspect of this course, the use of object-oriented programming, design patterns, refactoring and extreme programing will be discussed. As a graduate level course, the other aspect of this course focuses on automatic techniques that analyze software artifacts and thus facilitate the engineering process. Through course projects, students will acquire hands-on experience on analyzing software.

AV-635 Satellite Communications

Introduction to the theory and applications of modern satellite communications, Satellite channel characterization, Channel impairments and transmission degradation, Link calculations, Modulation, coding, Multiple access, Broadcasting, Random access schemes, Demand assignment, Synchronization, Satellite switching and onboard processing, Integrated service digital satellite networks, Satellite transponder, ground stations, packet switching, Optical satellite communications.

AV-640 Electromagnetic Field Theory

The course covers following topics. Vectors, Coulomb’s Law, Electric Field, Gauss’s Law, Scalar Potential, Conductors in Electrostatic Fields, Electrostatic Energy, Electric Multipoles, Boundary Conditions at Surface Discontinuity, Electrostatics in the presence of Matter, Special Methods in Electrostatics, Electric Currents, Ampere’s Law, Magnetic Induction, Integral form of ampere’s law, Vector Potential, faraday’s Law of Induction, Magnetic Energy, Magnetic Multipoles, magnetism in the presence of matter, Maxwell’s Equations, and Scalar and Vector Potentials.

AV-641 Transmission Lines and Waveguides

The course covers following topics. Plane waves, Polarization, Laws of Reflection and Refraction, Energy Relations, Waveguides (Fields in Bounded Regions), Circuits and Transmission Lines.

AV-671 Intermediate Optics

Geometrical optics, aberration theory, evaluation of optical systems, ray-tracing using commercial software, methods of optical design Radiometry: Optical transmission, irradiance, radiance, intensity, Optical sources: Common source types, systems design with sources, source specifications, source selection and system trades, Detectors and FPAs and Opto-mechanical design.

AV-672 Optical Waveguides and Cavities

Review of Maxwell’s equations and solutions. Electromagnetic waves in lossy, and anisotropic media. Waves at plane boundaries. Guided waves. Duality, uniqueness, image theory, equivalence principle, and reciprocity. Introduction to radiation and scattering. Problem formulation using Green’s function and integral equations.

AV-673 Optical Communication

Dielectric slab waveguides. Classification of mode types. Parabolic two-dimensional media. Circular waveguides. Step-index and graded-index optical fibers. Effect of loss. Dispersion effects. Fabrication methods in integrated optics and optical fibers. Light sources. Couplers. Opto-electronic devices. Applications in communication systems, Free space optical communication.

AV-711 Intelligent Control

Intelligent control strategies: Expert systems, Fuzzy logic control, neural networks Optimization control techniques: genetic algorithms, simulated annealing, Tabu search Hybrid systems, Applications.

AV-712 Optimal Control

The course covers following topics. Euler-Lagrange formulation; Hamilton-Jacobi approach; Pontryagin's minimum principle; Systems with quadratic performance index; Second variation and neighboring extremals; Singular solutions; numerical solution techniques.

AV-713 Non-Linear Systems

The course covers following topics. Introduction to the analysis and design of nonlinear systems and nonlinear control systems. Stability analysis using Lyapunov, input-output and asymptotic methods. Design of stabilizing controllers using a variety of methods: linearization, absolute stability theory, vibrational control, sliding modes and feedback linearization.

AV-714 Flight Dynamics & Control

This course covers Vector Kinematics, Quaternion and Matrix Analysis of Kinematics, Geodesy & Rigid Body Dynamics, Review of Aerodynamics, Static Stability Analysis, Review of Classical and Modern Control Theory, Nonlinear Aircraft Model, Linear Models and Stability Derivatives, Simulation of Aircraft Dynamics, Trim point, Calculations & Numerical Linearization, Aircraft Rigid Body Modes, Handling Qualities, Stability Augmentation, Control Augmentation, Autopilots.

AV-715 Robust Control

Introduction to Lebesgue and Hardy functional spaces, linear operators and norms; time and frequency domain representations of linear systems, internal stability, performance measures and their limitations; model reduction and approximation by balanced realization; classical method of robustness in frequency domain, Bode's gain and phase relations, sensitivity functions; different explicit models of system uncertainty, unstructured uncertainty and small gain theorem, robust stability and robust performance; structured uncertainty and mu-synthesis; H-2 and H-infinity optimal control; H-infinity loop shaping; Gap metrics, nu-gap metrics and extended loop-shaping design.

AV-716 Adaptive Control

Dynamic System Models, Signal Measures, lyapunov Stability, I/O stability, Adaptive parameter Estimation, Adaptive state feedback control, Continuous time MRAC, discrete-time MRAC, Indirect Adaptive Control, Multivariable Adaptive Control.

AV-717/IS-731 Soft Computing Systems

Fuzzy Sets, Fuzzy rules and reasoning, Fuzzy inference systems, least squares methods for system ID, derivative based optimization, derivative free optimization, Adaptive Networks, Supervised learning NN's, Learning from reinforcement, unsupervised learning, Neuro fuzzy interfaces, data clustering algorithms, neuro fuzzy control.

AV-718 System Identification

Introduction to System ID, Models, Review of linear systems, Review of probability, random variables, Stochastic processes, Response of linear systems to random inputs, Propagation of statistics, Introduction to Kalman Filtering, Least Sq Estimation method, Time domain methods, Freq. domain methods, Introduction to PEM, Regression analysis, Application of PEM to aircraft system ID, Experiment design, Maximum Likelihood Estimation methods, Maximum Likelihood Estimation methods, Subspace methods.

AV-719/IS-711 Neural Networks

This course will be an introduction to the basic neural network architectures and learning rules. Emphasis will be placed on the mathematical analysis of networks and learning rules, and on the application of neural networks to certain engineering problems in pattern recognition, signal processing and control systems. The course will incorporate necessary background material (such as linear algebra, optimization and stability), while including extensive coverage of performance learning, like the Widrow-Hoff rule and backpropagation. Several enhancements of backpropagation, such as the conjugate gradient and Levenberg-Marquardt variations, will be discussed. Simple building blocks will be used to explain associative and competitive networks, including feature maps, learning vector quantization, and adaptive resonance theory. Recurrent associative memory networks, such as the Hopfield network, will also be presented.

AV-720 Avionics Systems Integration

This course we covers Microprocessors (DSP/controllers), Real time operating systems Vx-works, Android and RT-Linux), Multi-thread programming , Scheduling schemes, Programming Communication buses (MLT-ST-1553, ARINC 429, CAN and MODBUS) , general design considerations /techniques and simulation of test systems via Hardware-In-The-Loop methodology, Embedded systems / Avionics system Components Communication Buses / Direct link, Real time operating systems User requirement generation. Design and development considerations.

AV-722 Stochastic Systems

Review of Random Processes & Linear Systems, Modeling of physical systems by stochastic differential & difference equations, Analysis of systems whose inputs are stochastic processes, Spectral factorization, parametric optimization,. Minimum variance control, State estimation of continuous-time and discrete-time systems, Linear stochastic control theory.

AV-723 Detection & Estimation

Brief Review Of Probability& Statistics, Detection Theory: Hypothesis Testing, Decision Criteria, Basic Concept Of Estimation: Maximum Likelihood, Maximum A Posteriori Estimator, Linear Estimation In Static Systems, Method Of Least Squares, Recursive Least Squares, Linear Dynamic System With Random Inputs, State Estimation In Discrete Time Linear Dynamic Systems, Estimation For Kinematic Model, Kalman Filter Applications, Extended Kalman Filter And Applications, Adaptive Estimation And Maneuvering Target Tracking, Input Estimation And Maneuver Detection, Variable State Dimension Approach, Multiple Model Algorithms, Interacting Multiple Model Algorithms For Maneuvering Targets, Multiple Sensor Data Fusion.

AV-724 Embedded System Design

Embedded system design fundamentals as well as reconfigurable logic design and implementation using a hardware description language are covered in this course. Experiencing various micro-controllers and microprocessors, participants discover hardware, software and firmware design trade-offs, tool chains, and best practices in current embedded systems development. Real-time operating system topics will be considered to further emphasize embedded hardware-software impacts. Numerous hands-on laboratory projects are provided to reinforce lecture concepts. A final project will integrate course topics into an embedded system design based on an intellectual property (IP) core implemented in a reconfigurable logic package and driven by application code loaded from either the development platform or on-board firmware.

AV-725 Communication Networks

This course covers physical layer communications, Link layer protocols, Introduction to queuing theory, higher layer protocols: TCP, IP and ATM, Routing algorithms, Flow control, Local Area Networks and multiple access, High performance switches and routers, Wireless Networks, Optical Networks and WDM

AV-726 Array Signal Processing

Array signal processing belongs to the general domain of space-time processing as it uses multiple sensors, arranged in a specific geometric arrangement, to acquire multiple versions of a signal. These multiple versions of the signal are processed jointly to estimate the location of the signal source. For multiple signal sources, we can determine and track the locations of these sources. This course covers Basics of Array Signal Processing: Wave fields in Open Space, Spatial Signal Processing, Transmit Beamforming Arrays, Receiver Antenna Arrays, Uniform Linear Arrays: Theory of Array Signal Processing, Source Localization using Frequency Wave-number Spectrum, Narrowband and Wideband, Subspace Methods, Mutual Coupling and Correlation, Beam-forming and Main Beam Steering, Null Placement; Implementation of Array Signal Processing Systems: Signal Processing Errors, Array Element Failure, Ill-conditioned Matrices; Applications of Array Signal Processing, Arrays for RADAR Applications, Arrays for SONAR Applications, Arrays for Biomedical Applications, Arrays for Wireless Communications

AV-727 Radar Signal Processing

This course will be an introduction to radar signal processing covering full range of basic signal processing techniques on which all radar systems rely, including topics such as target interference models, matched filtering, waveform design, Doppler processing, and threshold detection, CFAR and target tracking. In addition, introductions are provided to the advanced topics of synthetic aperture imaging and space-time adaptive array processing.

AV-731 Wireless Communications II

Capacity of fading channels, Wireless Channel Modeling, Performance of Communication systems in Fading Channels, Diversity (both receive and transmit), Multiple Antennas and Space Time Coding, MIMO, Adaptive modulation and Coding, Adaptive modulation and Coding, Multicarrier modulation, Capacity regions for different Multiple Access Systems (TDMA, FDMA, SSMA), Multiuser Diversity, Ad hoc and mesh networks: physical layer view and capacity

AV-734/IS-732 Principles of Real-Time Computing

The primary purpose of this course is to present an overview of real-time computing. Basic concepts, terminology, and problems of real-time computing are introduced. The constraints of real-time computing are used to contrast real-time applications from applications that are not real-time. The course focuses on software solutions to real-time problems. Issues that are addressed include scheduling, specification of system requirements and design, real-time software architectures, languages and operating systems for real-time computing, real-time problems in a distributed processing system, and hardware-software interfaces.

AV-735/IS-710 Design and Analysis of Algorithms

The course covers following topics. Computational models and techniques for analyzing the time and space complexity of algorithms. The design and analysis of recursive and non-recursive algorithms for searching, sorting, set operations, graph algorithms, matrix multiplication, etc. NP-Complete problems.

AV-736/IS-715 Optimization

An introduction to various methods of obtaining the extremum (minimum or maximum) of a non-dynamical system and the use of these methods in real-life applications. Computational methods for nonlinear optimization; unconstrained optimization. Constrained optimization; linear programming; simplex method for solving linear programs; Lagrange's conditions, the Karush-Kuhn-Tucker (KKT) conditions, Least squares, Penalty methods, Practical aspects of optimization.

AV-737/IS-720 Image Processing

The course is presented in three units. Foundations: the review of continuous-time and discrete-time signals, and spectral analysis; design of finite impulse response and infinite impulse response digital filters; processing of random signals. Speech processing: vocal tract models and characteristics of the speech waveform; short-time spectral analysis and synthesis; linear predictive coding. Image processing: two dimensional signals, systems, and spectral analysis; image enhancement; image coding; image reconstruction. The laboratory experiments are closely coordinated with each unit. Throughout the course, the integration of digital signal processing concepts in a design environment is emphasized.

AV-738 Adaptive Filter Theory

Theory and applications of adaptive filtering in systems and signal processing. Iterative methods of optimization and their convergence properties: transversal filters; LMS (gradient) algorithms. Adaptive Kalman filtering and least-squares algorithms. Specialized structures for implementation: e.g., least-squares lattice filters, systolic arrays. Applications to detection, noise cancelling, speech processing, and beam forming.

AV-740 Multimedia Signal Processing

Characteristics of speech and image signals; important analysis and synthesis tools for multimedia signal processing including subspace methods, Bayesian networks, hidden Markov models, and factor graphs; applications to biometrics (person identification), human-computer interaction (face and gesture recognition and synthesis), and audio-visual databases (indexing and retrieval). Emphasis on a set of MATLAB machine problems providing hands-on experience.

AV-741 Digital Video Processing

This course introduces fundamental theory and techniques for efficient representation and processing of video signals. Topics to be covered include: introduction to video systems, Fourier analysis of video signals, properties of the human visual system, motion estimation, basic video compression techniques, video communication standards, and stereo video processing. A term-project is required in the second half of the semester.

AV-742 RF and Microwave Circuit Design

Topics include resonators, filters, detectors, mixers, amplifiers, and microwave systems. There are student design projects for a micro-strip resonator, micro-strip low pass filter, and a high dielectric constant coaxial resonator bandpass filter based upon the Microwave Office software package and use of Mathcad at student’s option. LEC

AV-743 Microwave Engineering

Properties of waveguides, strip lines, and micro-strips. Scattering parameters. Butterworth and Chebyshev impedance transformers. Microwave couplers, cavities, and Fabry-Perot resonators. Periodic structures. Microwave filter design. Faraday rotation and non-reciprocal devices.

AV-744 Microwave Electronic Devices

The course covers following topics. Theory and design of passive and active microwave components and monolithic integrated circuits including: micro strip, lumped inductors and capacitors, GaAs FETs, varactor and mixer diodes, monolithic phase shifters, attenuators, amplifiers and oscillators. Experimental characterization of the above components using network analyzer, spectrum analyzer, power and noise meter

AV-745 Analog IC Design (Bipolar)

This course is devoted to the study of analog circuits realized in bipolar technology, with a focus on applications such as trans impedance amplifiers, and broadband amplifiers for networking and communications. The course begins with a consideration of device operation and the modeling needed to support both the hand analysis and computer simulation needed for design. Basic circuit building blocks and cascaded multistage amplifiers will be analyzed. The analysis and design of feedback circuits is a key component of the course.

AV-747 Semiconductor Device Technology

The principle of operation, device physics, and analytical numerical, and circuit device models for semiconductor devices, such as bipolar junction transistors, metal-semiconductor junctions and transistors, hetero structure junctions and transistors. Selected advanced semiconductor devices, such as novel microwave devices, are also introduced. Prerequisite: SDM-I or equivalent.

AV-748 Chaos Theory

This is a course on bifurcations, chaos, fractals and their applications in diverse fields such as price fluctuations in the stock market, flow of data traffic on the Internet, biological rhythms, and superconducting circuits with particular emphasis on applications in automatic control and telecommunications. The theory is developed systematically, starting with first-order differential equations and their bifurcations, followed by phase plane analysis, limit cycles and their bifurcations, and culminating with the Lorenz equations, chaos, iterated maps, period doubling, renormalization, fractals, and strange attractors.

AV-749 Analog IC Design (MOS)

Analysis, design and applications of modern analog circuits using integrated bipolar and field-effect transistor technologies. Provides the student with a working knowledge of the basic circuits used in modern analog integrated circuits and techniques for analysis and design.

AV-760 Power Electronics

Introduction to the fundamental operating principles of power conditioning circuits that are currently being used to effect power flow from ac to dc and vice versa. Emphasis is on the relationship between form and function of these circuits. Circuits discussed will include ac/dc line-commutated converters, dc/dc converters, dc/variable frequency converters, resonant converters, and ac/ac converters. Computer simulations will be used as a part of the course work.

AV-771 Photonics & Lasers

Radiative and non-radiative transitions; line broadening; optical wave-guides and resonators; resonator modes; oscillation and amplification; gain coefficient; rate equation analysis; semi-classical laser theory; density matrix formalism; lasing without population inversion; Q-switching, mode-locking and pulse compression; spectral narrowing.

AV-772 Integrated Photonics

Electromagnetic waves, silicon photonics, optical waveguides, waveguide couplers, waveguide filters, photonic electro-optical devices, silicon photonic modulators, silicon-germanium photodetectors, optical communications, Computational methods for integrated photonics Symmetric, dielectric waveguides. Fabrication of silicon waveguide, coupling to waveguide, Coupled mode theory, Germanium photodetectors Electro-optical effects Photonic modulators: State of silicon photonics industry.

AV-773 Photonic Devices

Optical properties of semiconductor materials, Diode lasers: steady state characteristics, dynamics, and noise,, Photonic crystals, Optical modulators, Optoelectronic integration, Introduction to active and passive photonic devices and applications; optical processes in semiconductor and dielectric materials including electrical junctions, light emission and absorption, and waveguide confinement; photonic components such as light emitting diodes, lasers, photodetectors, solar cells, liquid crystals, and optical fiber; optical information distribution networks and display application and . Blackbody radiation and thermal sources.

AV-774 Micro and Nano Fabrication

Semiconductor fabrication techniques, Pattern definition techniques; photolithography, electron beam writing, Nano-imprint and laser beam writing, Pattern transfer technologies; including wet chemical etching, plasma induced etching, focused ion beam and chemical assisted ion beam etching, thin Film deposition techniques; optical coatings, etching masks, isolation, Metal-semiconductor interfaces; aspects of Schottky and Ohmic contacts, Elements of mask design, silicon oxidation; chemical mechanical polishing, silicon epitaxy and metallization; diffusion and ion implantation; large scale production techniques; measurement of device parameters; mask design; dry etching; simulation of integrated processes; use of design of experimental methodology.

AV-775 Quantum Mechanics for Engineers

Brief review of quantum mechanics including operators, linear vector spaces and Dirac notation; General theory of angular momentum and rotation group, addition of angular momentum, Clebsh-Gordan technique, scattering of spin ½ particles with spin-less particles, tensor operators; a brief review of time dependent perturbation theory, interaction of radiation with matter, absorption of light, induced and spontaneous emission, electric and magnetic dipole transitions, selections rules and scattering of light.

AV-776 Plasmonics

Fields of plasmonic and plasmonic metamaterials, elementary descriptions of these two revolutionary concepts of Nano photonics, Nano photonic waveguides and cavities, surface-enhanced sensing devices, phenomena such as extraordinary transmission and super lensing, as well as first examples of active devices, the transformative force of plasmonics for a variety of disciplines ranging from materials research to biological sensing and imaging.

AV-799 MS Thesis

Thesis research work for MS Avionics Engineering.

AV-819 Instrumentation & Measurement for Aerospace Applications

Principles and Elements of Instrumentation and Measurement Systems, Review of Random Processes, Inertial Force Sensors, Inertial Rotation Sensors, Applications of rate gyros, Coriolis Angular rate sensors, Fiber optics gyros, Ring Laser Gyros, Filtering Estimation and Aiding.

AV-827 Navigation Systems

Introduction to navigation science, coordinate frames and transformations, review of relevant concepts from systems theory and random processes, discrete linear and nonlinear kalman filtering techniques, the global positioning system, inertial navigation, navigation examples and case studies.

AV-828 Missile Guidance

Tactical Missile Guidance: Proportional navigation; Important closed-form solutions and their utility; Method of Adjoints: Analysis of missile guidance systems using adjoints; Noise Analysis: Simulating noise, stochastic adjoints; Monte Carlo results; Proportional Navigation and Miss Distance: Useful design relationships for rapid guidance system sizing; Digital Noise Filters: Digital noise filter properties and system performance; Advanced Guidance Laws: Deriving optimal guidance laws without optimal control theory; Kalman Filters and the Homing Loop: Combining Kalman filtering and optimal guidance and optimal guidance techniques; Endoatmospheric Ballistic Targets: Speed, Re-entry angle, Ballistic coefficient; Extended Kalman Filtering: Performance comparison of linear, linearized, and extended Kalman filters; Other Forms of Tactical Guidance and Tactical Zones: Beam rider, command to line-of-sight guidance plus drag and acceleration factors; Strategic Considerations: Gravitation and it’s impact on performance; Boosters: Using the rocket equation and an introduction to gravity turn steering; Lambert Guidance; Miscellaneous Topics and T4 Guidance: Gravity compensation, pulsed and burnout guidance; predictor-corrector method; Radome Slope Estimation: Dither signals and bandpass filtering.

AV-829/IS-745 Information Theory

The course covers, Entropy rates of stochastic processes. Maximum entropy and Burg's Theorem. Kolmogorov complexity. Information theory and statistics. Stein's Lemma. AEP. Network information theory. Slepian-Wolf Theorem. Broadcast channel. Multiple access channel capacity. Optimal investment and information theory. Universal portfolios and universal data compression.

AV-831 Computer Vision

Course will explore current techniques for the analysis of visual data (primarily color images). In the first part of the course we will examine the physics and geometry of image formation, including the design of cameras and the study of color sensing in the human eye. In each case we will look at the underlying mathematical models for these phenomena. In the second part of the course we will focus on algorithms to extract useful information from images. This includes detection of reliable interest points for applications such as image alignment, stereo and instance recognition; robust representations of images for recognition; and principles for grouping and segmentation. Time permitting we will look at some additional topics at the end of the course.

AV-833/IS-735 Model based Software Testing

The course covers following topics. Fundamentals of software testing; Test generation using finite state models, State charts, Timed automata, Constraint Logic, Petri nets, Z, Combinatorial design, and others; Test adequacy assessment using black box and white box criteria; Industrial applications of model based testing. Students will be required to form small teams of two or three, preferably interdisciplinary, and make in-class presentations based on a selected topic in model based testing. The work of each team will be reviewed by the instructor and other teams.

AV-835 Advanced Mobile Communication

Overview of mobile communications Characterization and modeling of wireless fading dispersive channels Optimum receiver structure, Transmission performance in fading channels, Diversity and performance improvement, Co-channel interference, Spread spectrum and multiple access, Capacity analysis in cellular environments.

AV-846 Advanced Antenna Engineering

Antenna concepts, linear wire antennas, linear arrays, aperture and horn antennas, printed-circuit radiators, frequency-independent antennas, and measurement techniques.

AV-848 Microwave Design

This course presents advanced techniques applicable to the design of RF amplifiers and oscillators and emphasizes advanced theory and design techniques. Considerable emphasis is placed on micro strip implementation of UHF and microwave circuits. In the latter part of the course, commercially available computer-aided design and analysis software packages are introduced and used to complete the second design problem.

AV-871 Bio-Photonics

Bio-photonics aspects: light - biological matter interactions, optical spectroscopies and their applications, lasers in biology and medicine, photobiology, optical imagery, optical biosensors, light as a therapeutic tool, micro-array technology, laser tweezers and emerging bio-photonic technologies, Overview of the field of bio-photonics, in three segments: (1) fundamental principles of light, optics, lasers, biology, and medicine; (2) diagnostic bio-photonics including imaging, spectroscopy, and optical biosensors; (3) therapeutic applications of bio-photonics including laser ablation and photodynamic therapies.

AV-872 Metamaterials and Nano Photonics

Introduction to the course, Metamaterials: theory and design, Negative refraction and perfect lens, Engineering giant optical activity, Theory of planar metmaterials , Chiral effects in planar metamaterials, Dispersion engineering and slow light, Collective effects in metamaterials, Cloaking and transformation optics (part 1), Cloaking and transformation optics (part 2), Metamaterial fabrication technologies, Optics of metals , Plasmons and their excitations, Plasmonic nanoparticle, Hybridizing plasmonic resonances (part 1), Hybridizing plasmonic resonances (part 2), Plasmonic waveguides, Challenges in plasmonics, Optical antennas, Extraordinary transmission, Purcell effect, Low-dimensional forms of carbon (part 1), Low-dimensional forms of carbon (part 2) and Photonics of nanoscale phase transitions.

AV-873 Nonlinear Optics

Nonlinear optical susceptibility; wave equation description of nonlinear optical interactions; quantum mechanical description; harmonic generation; intensity-dependent refractive index; optical Bloch equations; nonlinear wave mixing; optical phase conjugation, self-focusing, optical bistability; pulse propagation and optical solutions; acoustic-optic and electro-optic effects; simulated scattering processes; photorefractive effect.

AV-880 Advanced Topics in Control Engineering

Current topics of interest in control systems.

AV-881 Advanced Topics in Communications

Current topics of interest in communications.

AV-882 Advanced Topics in Microwave Engineering

Current topics of interest in microwave engineering.

AV-883 Advanced Topics in Photonics

Current topics of interest in Photonics.

AV-899 PhD Thesis

Thesis research work for PhD Avionics Engineering.

MA-644 Advanced Engineering Mathematics

Theory of linear algebra, Eigen values, Eigen vectors, orthogonality. Vector calculus, Gauss’s divergence theorem, Stokes’s theorem, Cartesian tensors, Variational calculus, Linear programming, Constrained and unconstrained Optimization, Integral Transforms (Laplace, Fourier, Mellin, Hankel, Z-Transform), Numerical Integration are introduced.

IS-660 Computer Networks

The course will cover classical concepts such as network architecture, switching, routing, congestion control, and quality-of-service, and discuss recent developments in these areas. The course will also cover new developments in networking such as network measurements, network management, overlay networking and peer-to-peer systems, network security, and new network architectures. The course will emphasize a system-oriented and empirical view of Internet architecture.

IS- 661 Computer Security

Introduction of the basic notions of confidentiality, integrity, availability; authentication models; protection models; security kernels; secure programming; audit; intrusion detection and response; operational security issues; physical security issues; personnel security; policy formation and enforcement; access controls; information flow; legal and social issues; identification and authentication in local and distributed systems; classification and trust modeling; risk assessment.

IS-766 Operating System Security

This course covers both fundamentals and advanced topics in operating system (OS) security. We will study OS level mechanisms and policies and how they relate to mitigating and defending against real-world attacks on computer systems, including self-propagating worms, large-scale botnets, and advanced malware. Basic OS security techniques such as logging, system call auditing, address space randomization, memory protection, virtual machine introspection (VMI) will be discussed. Recent advanced techniques such as host-based intrusion detections, system randomization, vulnerability fingerprinting, and virtualization will also be introduced.

IS-770 Cloud Computing

This course will begin by first establishing the definition of cloud computing, then describing the various service delivery models of a cloud computing architecture, and the ways in which clouds can be deployed as public, private, hybrid, and community clouds, followed by a much deeper review of the security and privacy issues related to cloud computing environments. We will examine cloud computing models, look into the threat model and security issues related to data and computation outsourcing, and explore practical applications of secure cloud computing. Using the confidentiality, integrity, and availability of data (CIA) model we will examine the threats and security implications to befall poorly established and maintained cloud computing environment. Audit approaches and methodologies for assessing internal control exposures within cloud computing environments will also be fully discussed and examined.

IS-771 Parallel and Distributed Processing

This course covers a broad range of topics related to parallel and distributed computing, including parallel and distributed architectures and systems, parallel and distributed programming paradigms, parallel algorithms, and scientific and other applications of parallel and distributed computing. In lecture/discussion sections, students examine both classic results as well as recent research in the field. The lab portion of the course includes programming projects using different programming paradigms, and students will have the opportunity to examine one course topic in depth through an open-ended project of their own choosing. Course topics may include: multi-core, SMP, MMP, client-server, clusters, clouds, grids, peer-to-peer systems, GPU computing, scheduling, scalability, resource discovery and allocation, fault tolerance, security, parallel I/0, sockets, threads, message passing, MPI, RPC, distributed shared memory, data parallel languages, MapReduce, parallel debugging, and applications of parallel and distributed computing.

IS-791 Digital Forensics

The knowledge of computer and network forensics has become essential in securing today's network-centric computing environment. This new course will give the students both the fundamental knowledge and hands-on practice on computer and network forensics. The added exposure to forensics will enhance the marketability of our students and serve the students who carry the skills and knowledge forward into their future careers.

IS-799 MS Thesis

Thesis research work for MS Information Security.

IS-650 Number Theory

This course covers basic notions and algorithms from public key cryptography such as key exchange, digital signatures, zero knowledge proofs, RSA, ElGamal, integer factorization, index calculus, elliptic curve cryptography. The topics include Group theory, Galois theory, modular and finite field arithmetic, Chinese Remainder theorem, primality testing, polynomial and integer factorization algorithms, index calculus and discrete logarithm-based schemes, and basic notions from lattice-based cryptography. It also includes basic number-theoretic methods and algorithms for cryptanalysis of protocols and schemes based on PKC.

This course covers basic notions and algorithms from public key cryptography such as key exchange, digital signatures, zero knowledge proofs, RSA, ElGamal, integer factorization, index calculus, elliptic curve cryptography. The topics include Group theory, Galois theory, modular and finite field arithmetic, Chinese Remainder theorem, primality testing, polynomial and integer factorization algorithms, index calculus and discrete logarithm-based schemes, and basic notions from lattice-based cryptography. It also includes basic number-theoretic methods and algorithms for cryptanalysis of protocols and schemes based on PKC.

IS-651 Cryptography

This course covers block ciphers, stream ciphers, cipher modes of operation, public key cryptosystems. It includes historical account of classical mono-alphabetic and poly-alphabetic ciphers like shift ciphers, substitution ciphers, Vigenere cipher, Playfair Cipher Hill Cipher and Machine Ciphers. This would be followed by modern cryptography including Stream Ciphers, Block Ciphers (including Fiestel structure and SPN based designs) and Public Key Cryptography (RSA, Diffie-Hellman, Digital Signatures, Digital Certificates and Elliptic Curve Cryptography). Additionally, Cryptographic Support Functions like Key Generation, Key Exchange, Message Authentication and Hash Functions would also be discussed.

IS-662 Information Privacy and Security

Access Control Matrix Model, Decidability of safety / security, Protection Models, Policy Formation, Bell-LaPadula model, Biba model, Information flow, Authentication and Identity, Application of cryptographic protocols in Identity and Authentication management systems, Secure design principles, System Design: TCB and security kernel construction, Least-privilege, Verification and validation. Risk Analysis, Certification issues, Network Security architectures, Security Evaluation, Role of audit and control, Audit Mechanisms, Malicious Code: Viruses, Worms, Misuse and intrusion detection, Vulnerability Analysis, Cyberlaw

IS-663 Advanced Analysis of Algorithms

Advanced algorithm analysis including the introduction of formal techniques and the underlying mathematical theory. NP-completeness; Search Techniques; Randomized Algorithms. Heuristic and Approximation Algorithms; Topics include asymptotic analysis of upper and average complexity bounds using big-O, little-o, and theta notation. Fundamental algorithmic strategies (brute -force, greedy, divide-and-conquer, backtracking, branch-and-bound, pattern matching, and numerical approximations) are covered. Also included are standard graph and tree algorithms. Additional topics include standard complexity classes, time and space tradeoffs in algorithms, using recurrence relations to analyze recursive algorithms, non-computable functions, the halting problem, and the implications of non-computability. Algorithmic animation is used to reinforce theoretical results.

IS-722 Analysis of Stochastic Systems

The Meaning of Probability, The Axioms of Probability, Set theory, Probability Measure, Probability Space, Conditional probabilities and Independent Events, The concept of a Random Variable, Probability distribution and density functions, Conditional probability distributions and densities, Bayes’ theorem, Functions of one Random Variable, Two or more Random Variables, Multivariate probability distribution and density functions, Expected value, Moments and Characteristic functions, Mean square estimation and the Orthogonality principle, Sequences of Random Variables, The Central-limit Theorem, Random Processes, Stationary processes, Stochastic continuity and differentiation, Stochastic differential equations, Correlation and Power spectrum of Random Processes, The response of Linear Systems to Wide Sense Stationary inputs

IS-762 Information Security Management

Access Control, Managing Identity and Authentication and Controlling and Monitoring Access. Secure Network Architecture & Securing Network Components, Secure Communication and Network Attacks. Information Security Governance & Risk Management, Personnel Risk Management Concepts and Protecting Security of Assets. Software Development Security and Malicious Code & Application Attacks. Cryptography & Symmetric Key Algorithms and PKI and Cryptographic Application. Principles of Security Models, Design & Capabilities, Security Vulnerabilities, Threats & Countermeasures and Security Assessment & Testing. Managing Security Operations. Business Continuity & Disaster Recovery Planning, Preventing & Responding to Incidents and Disaster Recovery Planning. Legal, Regulations, Investigations and Compliance. Physical (Environment) Security. Standards. Common Criteria and ISO-27001

IS-761 Network Security

Internet Architectural Principles, Layer 2 Interconnects and Switching. LAN security. Internet Addressing, ARP, DHCP and DNS and their security issues. Intra-domain Routing and security issues, Inter-domain Routing (BGP) and security issues. End-to-End Congestion Control (TCP)Router Mechanisms for Congestion Control. Quality of Service. Multicast. Network Security (SSH,DDoS,Firewalls,Intrusion Detection). Network Management. Peer-to-Peer Systems Router Architecture: packet lookup and classification

IS-764 Mobile Security

Introduction and history of mobile security, the mobile industry players and stakeholders, The mobile threat landscape, End-to-end mobile security, Wireless bearer security and how the mobile network interacts with the device, hardware security, applications, signing and App Store security. Secure software development on mobile, Native application and mobile web application security, mobile application development and developer ecosystems, authentication, encryption, hardware security and trust, Mobile Malware, Methods and techniques used by malware developers, static and dynamic analysis, best practices for countering malware throughout the mobile value chain, industry information sharing, Mobile Security Design and Management Considerations, Privacy, child protection and workplace policies, mobile handset forensics, incident handling, cyber security

IS-781 Wireless Network Security

Vulnerabilities of Wired and Wireless Networks, Attacks in wireless networks: Passive and Active Attacks, DOS and DDoS attacks, TCP attack, Trojan Attacks, Xhole attacks etc. Securing neighborhood discovery. Securing route in multi-hop networks. 802.11Security and authentication mechanism. Security in Ad-Hoc networks, Reactive, hybrid and Proactive routing security. Data modification and tunnel attacks, intrusion detection and intrusion tolerance in various networks. WSN security for real time applications. Key agreements in 5G networks. Security measures in L2 and L1 of 802x protocols. Trust assumptions in cooperative networks. Trust management in relay networks. Selfish behavior at MAC layers of CSMA/CA, Selfishness in packet forwarding.

IS-741 Intrusion Detection System

IDS/IPS definition and classification -Basic elements of attacks and their detection -Misuse detection systems (search algorithms and applications in IDS) -Anomaly detection systems (machine learning basics: principles, measures, performance evaluation, method combinations, basics of artificial neural networks, clustering (hierarchical and partitional) and supervised learning in IDS) -Testing IDS and measuring their performances -Computational complexity-theoretic and information-theoretic IDS models and quality criteria -Intrusion detection in virtual networks.

IS-742 IT Security Evaluation & Auditing

IT environment and role of the IT auditor, Understanding business risk IT governance – the starting point Legal and regulatory mandates (SOX, Privacy, PCI, etc.) Audit standards and pronouncements, AICPA, GAAP, GAAS, IIA, ISACA Audit and other frameworks (tools of the trade), COSO, COBIT, FFIEC, ISO, ITIL, IT audit process: Part 1 – Developing the IT audit plan, IT audit process: Part 2 – Conducting the IT audit, Auditing systems development and maintenance, Risks defined, Software development life cycle process, Change and release management policy, Source code and production control, Auditing IT security, Auditing IT service delivery and support, Auditing business continuity and disaster recovery, Data analytics and fraud investigations, Managing third party risk

IS-743 Cloud Computing Security

Introduction to Cloud Computing, Cloud Reference architecture, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Cloud Security, Virtualization, Trusthworthy computing, Secure Computation, Cloud Management, Data Management, Data Security, Regulatory Compliance, Forensics and Malware

IS-744 Computer Forensics

Introduction to Computer Forensics, The computer forensic process overview, Hardware forensics, Computer forensics tools, Forensics readiness, Networks forensics, Live forensics, Professionalism and ethics in computer forensics, Privacy, Cyber forensics

IS-745: Information Theory

The course includes introduction to Information Theory, probability, discrete random variables, Entropy, Probabilities and Inference, random vectors, Markov chains, data compression, noisy channel coding, efficient encoding, hash codes, binary codes, very good linear codes, message passing, Neural networks, Sparse Graph codes and Cybernetics. Information theory research

IS-746 Digital Forensics and Incident Response

Incident response plan, Forensic Fundamentals, Network Evidence Collection, Host-Based Evidence, Understanding Forensic Imaging, Network Evidence Analysis, Analyzing System Memory, Analyzing System Storage, Forensic Reporting, Malware Analysis, Threat Intelligence

IS-747 Vulnerability Exploitation and Defense

Virtual address space organization, Overview of the Extensible Linking Format (ELF), x86 instruction set, calling conventions, Dynamic linking/loading, Control-flow Hijacking & Code Injection, Control data corruption techniques, Shellcode Development, Assembling /disassembling, Alphanumeric shellcodes, Raw syscall invocation methods, Non-Executable Memory & return-to-libc, Executable space protection, Advanced ret2libc exploitation, Code Reuse, ret2libc chaining, %esp lifting, Address Space Randomization, Address Space Layout Randomization (ASLR), Return-Oriented Programming, Exploitation without code injection, Memory Disclosure & Just-In-Time Code Reuse, Format string vulnerabilities, Techniques for bypassing fine-grained ASLR, Toolchain-based Hardening

IS-748 Software Security Testing and Code Assessment

Foundations of secure programming, Language-specific security issues, vulnerabilities, Exploitation techniques, Operating system defenses, Compiler defenses, Models of secure software development, Effectiveness of techniques such as virtualization, stack and heap protections, address space randomization, and session security. Buffer Overflow Defenses and other Input Validation Issues, Fail Secure, DoS Prevention, Evaluating Components for Security, Secure Coding practices assesment

IS-749 Reverse Engineering and Malware Analysis

Steps in software reverse engineering, Instruction set architectures, Common file formats and file-level reverse engineering tools, Fundamental principles and techniques to disassembly, Recognizing high-level constructs, Control flow and data flow analysis, Calling conventions, Function recognition, Decompilation challenges, Introduction to decompilation techniques, Common anti-disassembly techniques, Limitations of static analysis techniques, Basic dynamic analysis techniques, Dynamic instrumentation, Automatic malware classification based on dynamic analysis, Integrated static and dynamic analysis, Symbolic execution, Reverse engineering of network protocols, Anti-debugging techniques, Anti-virtual machine techniques, Malware detection techniques, Anti-signature techniques: Obfuscation and packing, Firmware analysis challenges, Firmware analysis techniques

IS-750 Applied Cryptography

The course builds on concepts covered in Cryptography course and covers Key Management Protocols (like Needham-Schroeder Key Distribution Protocol and Kerberos), Random Number Generators (PRNGs and TRNGs), implementation of cryptographic algorithms for application in internet protocols and wireless networks (PGP, SSL/ TLS, IPSEC, Tor Protocol, 802.11i, WEP, WPA and WPA2), authentication techniques/ ID management and attacks (password storage, dictionary attacks and HashCat), security issues in peer-to-peer networks (Distributed Hash Tables and Consistent Hashing, BitTorrent Protocol, Kademlia Protocol, security aspects of structured DHT-Based P2P protocols, anonymity in structured P2P Overlay Networks), web security (PHP Exploits, SQL Injection sttacks and Slowloris sttack) and mobile communication security (ciphers in 2G, 3G, 4G networks).

IS-751 Cryptanalysis

Cryptanalysis employs mathematical and algorithmic tools to evaluate the security level of cryptographic systems and protocols. The course explains standard cryptanalysis techniques used for analyzing and attacking different types of cryptographic schemes, focusing on aspects of private and public-key cryptography. It includes an overview of the basics of cryptanalysis followed by introduction to cryptanalysis techniques of classical ciphers (mono-alphabetic, poly-alphabetic, Frequency Analysis, Kaisiski and Friedman Tests). The focus is then shifted to cryptanalysis of modern ciphers including Block ciphers (Linear & Differential Cryptanalysis, Related Key attacks), Stream ciphers (Berlekamp Massey algo, Correlation & Fast Correlation attacks), Public Key based ciphers (Discrete Log & Integer Factorization) and Elliptic Curve based ciphers.

IS-752 Quantum Cryptography

Topics covered in this course include qubits, Quantum gates, Measuring qubits in a basis, Pure and mixed quantum states, Partial trace, Generalized measurements, Encrypting quantum bits with the quantum one-time pad, The power of entanglement, Sharing a classical secret using quantum states, Uncertainty principles as a guessing game, Privacy amplification, Universal hashing, Quantum key distribution protocols, Purifying protocols using entanglement, Quantum Cryptography using untrusted devices, Testing devices using a Bell experiment, Security of device-independent quantum key distribution against collective attacks, Quantum Cryptography beyond key-distribution, Bit commitment and oblivious transfer, Impossibility of bit commitment, Weak commitments and coin tossing, Perfect security from physical assumptions, Noisy storage model, Security from quantum uncertainty, Weak string erasure, Position verification from weak string erasure, Sharing a quantum secret and Secure computations on a remote quantum computer.

IS-753 Advance Cryptography

The course intends to build on the contents covered in Cryptography and Applied Cryptography and introduce latest research domains. Topics covered in this course include designing non-linear transformations, S-boxes, Light Weight Block Ciphers, Threshold Cryptography, Private Information Retrievals, Lattice-based Cryptography, Quantum-safe Cryptography, cascaded use of Cryptography and Steganography.

IS-754 Steganography

Topics covered in this course include covert communication, cryptography, cryptographic primitives, overview of steganography, growth of Steganography, Steganography in use, flaws of Steganography, variations on stego, security and Steganography, principles of Steganography, types of Steganography, digital watermarking, the internet: a climate for deceit, corporate espionage, playing spy, network Steganography, multimedia data hiding, data hiding among android mobile devices, apple iOS data hiding, operating system data hiding, virtual data hiding, forensics and anti-forensics, cracking Steganography and Cryptography, developing your secure communications strategy, Steganography as a countermeasure, the future of Steganography.

IS-841 OS & File System Forensics

This course focuses on advanced analysis of the FAT, NTFS, EXT, and HFS file systems. It uses advanced forensic tools and hands-on exercises to help students understand how data is stored at the file system level. Topics include Physical and logical disk structures, general file system identification, volume analysis, Clusters, File System Metadata, Live, Deleted, Unallocated data and File Slack . Kernel architecture, device driver architecture, registry, auditing, and security architecture. FAT File System handling, Data Recovery from the FAT File System, Forensics and reconstruction of file and directory structures on the FAT file system NTFS File System, NTFS Data Structures, Data Recovery from the NTFS File System, Forensics and reconstruction of file and directory structures on the NTFS file system. HFS+ File System, HFS+ Data Structures, Data Recovery from the HFS+ File System, Forensics and the HFS+ File System. EXT2 , EXT3, EXT4 Concepts and Analysis. UFS1 and UFS2 Concepts and Analysis. Mobile Forensics

IS-842 Network Forensics

Network forensics course include cyber-attack prevention, planning, detection, response, and investigation. The modular distribution of the course starts from the basics of HTTP protocol, forensic value, tracking and artifact extraction, log formats, analysis methods, tunneling, logging methods, amplified attacks, rules and signatures. Log sources including sys log, Microsoft OS & Application level events and firewalls, SSL, TLS, MITM, and network protocol reverse engineering will also be covered in the course. Advance topics will include forensic duplication and analysis, network surveillance, anti-forensics techniques, anonymity and pseudonymity.

IS-843 Penetration Testing and Vulnerability Analysis

Topics include Maximizing Value from Vulnerability Assessments and Programs, Enterprise Architecture and Strategy, Developing Transformational Vulnerability Assessment StrategiesPerforming Enterprise Threat Modelling, Generating Compounding Interest from Threat Intelligence and Avoiding Information Overload, The Vulnerability Assessment FrameworkActive and Passive Reconnaissance, Identification and Enumeration with DNS, DNS Zone Speculation and Dictionary-Enabled Discovery, Port Scanning, Scanning Large-Scale Environments, Scanning the Network Perimeter and Engaging the DMZ, Enhanced Vulnerability Scanning, Risk Assessment Matrices and Rating Systems, Quantitative Analysis Techniques Applied to Vulnerability Scoring. Assessing VOIP Environments, Discovering Vulnerabilities in the Enterprise Backbone: Active Directory, Exchange, and SharePoint, Vulnerability Validation, Triage, and Data Management, Remediation and Reporting Tactical Employment of the Vulnerability Assessment Framework. Web App Penetration Testing and Ethical Hacking Configuration, Identity, and Authentication Testing, Command Injection, Directory traversal Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection, XML External Entity (XXE) Cross-Site Scripting (XSS), CSRF, Logic Flaws and Advanced Tools, Network Penetration Testing and Ethical Hacking, Comprehensive Pen Test Planning, Scoping, and Recon, In-Depth Scanning, Exploitation, Post-Exploitation and Merciless Pivoting, In-Depth Password Attacks and Web App Pen Testing, Social Engineering for Penetration Testers

IS-844 Legal Aspects of Information Security

An advanced course on the legal aspects involved in the work of information security professional. Topics include Law in a Digital Environment, Law and IT, IT more than a Tool, Changing Legal Infrastructures, Freedom of information and privacy protection, E-government Intellectual Property Rights on the Internet. Copyright, Trademarks and Domain Names, Patents, Intellectual property law and ownership in employment relationships, Electronic Signatures in a Legal Context. PKI Technology, Policies and Procedures in PKI, Legal aspects of Electronic Signatures, Dispute resolution on the Internet, Designing a legal interface for contracting on the Internet, E-procurement. Criminal Law in Cyberspace, IT Crime, The Crimes, the Procedures, Co-operation, Enforcing the Law. Cyber Crime laws in contemporary countries and worldwide. IC3, NW3C, Cooperative Cyber Defense Centre of Excellence, LI, Cybercrime laws in US, UK, China, Russia and India. Cyber Crime Law in Pakistan, The current Status, Governing Bodies, Data Protection Act, Prevention of Electronic Crimes, Freedom of Information Act, Investigation of fair trial act, Right to information ordinance

IS-845 Security Risk Analysis and Management

The course contents will include modules of Information Security, Risk Management Process, Framework and Life Cycle , Quantitative versus Qualitative Risk Assessment, Defining Information Security Metrics, Analysis Techniques, Automating Metrics Calculations and Tools. Key information security principles, information security strategies keeping in view the individual privacy, risk remediation efforts, analysis of enterprise security by performing various types of analysis such as vulnerability analysis, penetration testing, audit trail analysis, system and network monitoring, and configuration management.

IS-846 Advanced Web Security

This course covers architecture of web applications, Design patterns, languages and framework, logic flaws and MEAN stack as a kickoff content. Besides HTML based interfaces, other popular ways of accessing web application (Flash, Java, Active X, and Silverlight) will be part of the syllabus along with SOAP and REST web services, Wireshark stream extraction and new HTTP protocols issues. To understand web security, popular security attacks will be studied including SQLi, XSS, XSRF and others as available on OWASP. Securing communication channel, preventing unauthorized access and handling untrusted data will also be part of the course.

IS-847 Secure Electronic Commerce

The course provides an overview of the requirements and means for the protection of data during processing, storage and transmission, which is an essential feature in the design of eCommerce systems. Topics covered in this course include attacks against eCommerce systems that include malicious software, network attacks (e.g. DDoS), phishing attack, password guessing attack, etc. eCommerce protection systems: firewall, intrusion detection system, access control mechanisms. Security policies for eCommerce systems, information security management and standards. Critique and assessment of security measures. Secure email protocols and schemes. Secure web browsing, online banking, online shopping and similar eCommerce systems. Fundamental cryptographic protocols for eCommerce systems: SSL, IPSec, IKE, SET. Security protocol design. Techniques and ethics in web and privacy data protection. Electronic cash, electronic auction, payment systems. Intellectual property protection techniques, Outsourcing/Cloud Computing architectures, The Payment Card Industry – Data Security Standard, Supply Chain Security, eWallet, Bitcoin

IS-848 Information Security Engineering

This course presents principles and processes for designing secure systems. Topic are aimed to teach how the fundamental organization of a system contributes to or detracts from the engineer’s ability to provide secure design, and to recognize how security-related components compose a system of interest within any system. The topics include fundamental concepts and objectives in Information Security Engineering, problem statement and taxonomy of threats, solution elements and taxonomy of defenses, Information Security engineering principles, Data security Discovery, classification, tagging: Authorization and access control, ACL and capability systems, XACML and SAML standards, DAC and MAC mechanisms, Flow control - DLP and DRM. Authentication techniques and principles. Unified Threat Management, Faults, errors, and failures mapping to vulnerabilities, attacks, and intrusions, Threats - Types, vehicles, paths, Vulnerabilities - Classifications and top rankings, Attacks - Vectors, process, lifecycle, classifications and top rankings, Intrusions - Prevention, monitoring, detection, and recovery, Vulnerability scanning, penetration testing, and tools, Intrusion detection, digital forensics, and tool. Security administration, Risk management, Policy governance, Procurement, deployment, operation, Reporting, compliance, control, and audit

IS-851 Block Chain Technology

The course is designed to provide an understanding of block chain technology and its application in decentralized digital currencies (cryptocurrencies), supply chain and transactions. In particular, the course will survey the theory and principles by which cryptocurrencies operate, practical examples of basic cryptocurrency use, including clients, wallets, transactions.

IS-852 Elliptic Curve Cryptography

Temper resistant cryptographic processors are becoming standard way to enforce data usage policies. Their history began with military cipher machines and evolved to custom authentication dongles for system/ domain. From these specialist beginnings, dedicated crypto chips have become customary to be employed in secure system designs. In this course students shall learn the art of implementing cryptographic logics in reconfigurable hardware. It takes students from basic understanding of modern cryptography, reconfigurable hardware, processor design architectures, hardware programming language (Verilog/ VHDL), implementation of number theory algorithms, prime and binary field arithmetic and then provide a practical experience of designing and implementing an efficient cryptographic processor for any advanced algorithm.

IS-853 S-Box Design and Analysis

Substitution Boxes (S-Boxes) are typically the fundamental non-linear component of nearly all modern SPN and Fiestel structure based block ciphers. This course focuses on the design of S-Boxes and analysis of their cryptographic strength. It starts with the introduction to Boolean functions, the basic building blocks of an S-Box. It then covers the desirable properties of Boolean functions for utilization as component functions as well as those of an S-Box. These include non-linearity, algebraic degree, algebraic immunity, correlation immunity, propagation characteristics, avalanche and strict avalanche criteria etc. It also presents an introduction to Bent functions and their properties. Finally, the course presents various S-Box construction methods and tests to assess the cryptographic strength of the designed S-Boxes.

IS-854 Crypto Processor Design

Temper resistant cryptographic processors are becoming standard way to enforce data usage policies. Their history began with military cipher machines and evolved to custom authentication dongles for system/ domain. From these specialist beginnings, dedicated crypto chips have become customary to be employed in secure system designs. In this course students shall learn the art of implementing cryptographic logics in reconfigurable hardware. It takes students from basic understanding of modern cryptography, reconfigurable hardware, processor design architectures, hardware programming language (Verilog/ VHDL), implementation of number theory algorithms, prime and binary field arithmetic and then provide a practical experience of designing and implementing an efficient cryptographic processor for any advanced algorithm.

IS-855 Lightweight Cryptography

Lightweight cryptography is an encryption method that features a small footprint and/or low computational complexity without compromising on security. The course covers expanding the applications of cryptography to constrained devices and its related international standardization. Security of IoT and RFID (low computational platforms) would be covered during this course.