UNO Course Descriptions
Information Assurance - Science
IASC 4430: Quantum Computing and Cryptography
The course aims at understanding the exciting concepts behind quantum computing and quantum cryptography. The course will introduce the principles of qubits, superposition, entanglement, teleportation, measurement, quantum error correction, quantum algorithms such as quantum Fourier transformation, Shor's algorithm and Grover's algorithm, quantum key exchange, quantum encryption, and secure quantum channels that built using these principles. We will discuss the security definitions and protocols within the quantum realm. We will discuss what advantages quantum computing and cryptography offers compared to classical computing and cryptography and limitations thereof. It will cover the integration of quantum cryptography into existing public key infrastructure. The students will come out with a working understanding of the field of quantum computing and quantum cryptography. During the course students will also implement several of the quantum algorithms.
- Credits: 3
- Prereq: Co-requisites: IASC 3570 Cryptography or CSCI 4560 Number Theory & Cryptography or Instructor permission
- Cross List: IASC-8436
IASC 8456: Host-Based Vulnerability Discovery
The class will cover security issues at an implementation and hardware level. The students will learn assembly language and the use of a reverse assembler and debugger. This will allow the student to analyze various "packing" algorithms for computer viruses, the viruses themselves, operating system "hooking", "fuzzing", and other machine code, host-based exploits. The class will be using both Windows and Linux as operating systems.
- Credits: 3
- Prereq: Permission of the instructor and CSCI 3710 - Introduction to Digital Design and Computer Organization.
- Cross List: IASC-4450
IASC 8466: Network-Based Vulnerability Discovery
The course is an advanced class in which the students learn various techniques for testing for and identifying security flaws in network software and web applications. Internet technologies such as HTTP, DNS, DHCP, and others are examined in the context of cyber security. Students are expected to participate in numerous hands-on experiments related to Information Assurance with respect to web technologies.
- Credits: 3
- Prereq: Instructor Permission
- Cross List: IASC-4460
IASC 8986: Special Topics in Information Assurance
The course provides a format for exploring advanced research areas for undergraduate students in Information Assurance and related fields. Specific topics vary, in keeping with research interests of faculty and students. Examples include applied data mining, mobile security, web services and applications, vulnerability assessments, cloud computing security, and other issues in Information Assurance research.
- Credits: 1-3
- Prereq: Instructor Permission.
- Cross List: IASC-4980
Our Campus. Otherwise Known as Omaha.
The University of Nebraska does not discriminate based on race, color, ethnicity, national origin, sex, pregnancy, sexual orientation, gender identity, religion, disability, age, genetic information, veteran status, marital status, and/or political affiliation in its programs, activities, or employment. Learn more about Equity, Access and Diversity.