No
Recommended: CIS 5560 Cryptography
In this course, students learn techniques for building, deploying, and maintaining secure systems. The course covers threat modeling, security-informed system design techniques, secure software development processes and techniques, and security operations tools and techniques. The course also specifically considers how to communicate security risks and tradeoffs to stakeholders effectively. As computer security is a constantly evolving field, the course places particular emphasis on means to empirically evaluate security choices, and how to consider economic and risk-based incentives underlying security decisions. Students are expected to have prior knowledge of CIS 2400 and STAT 4300 or equivalent. CIS 4510/5510 or CIS 5560 are recommended.