Select from the following: 1 | 12 | |
Network Security | ||
Introduction to Hardware Security | ||
Cryptography Engineering | ||
Introduction to Privacy: Policy and Technology | ||
Binary Exploitation: Tools and Techniques | ||
Software Security | ||
Wireless Security | ||
Current Topics in Computer Security | ||
Computer Security | ||
Advanced Network Security | ||
System Security | ||
Select from the following: 1,2 | 8 | |
Computer Architecture | ||
Network Security | ||
Introduction to Hardware Security | ||
Compiler Construction | ||
Implementation of Operating Systems | ||
Advanced Computer Networks | ||
Distributed Systems | ||
Cryptography Engineering | ||
Introduction to Privacy: Policy and Technology | ||
Special Problems 2 | ||
Binary Exploitation: Tools and Techniques | ||
Software Security | ||
Wireless Security | ||
Current Topics in Computer Security | ||
Computer Security | ||
Advanced Network Security | ||
System Security | ||
Theory of Numbers | ||
Game Theory | ||
Numerical Analysis I | ||
Numerical Optimization | ||
Abstract Algebra I | ||
Mathematics/Statistics Elective | ||
Select from the following: | 4 | |
Calculus IV | ||
Methods of Proof in Mathematics | ||
Linear Algebra II | ||
Total units | 24 |
Students in this concentration must take CSC 321 as part of their major. | |
1 | Courses taken in this list cannot be double-counted in the concentration. |
2 | An additional 4 units of CPE/CSC Technical Electives is needed if CPE/CSC 123 is not taken in the major. |
3 | Up to 4 units may be taken from CSC 400. |