EDUCATION
  • Overview
  • Seminars & Certifications
  • Professional Training

    • Digital Forensics
    • Network Security
    • Wireless Security
  • Professional Education

    • Master Cyber Security
    • Doctoral Cyber Security

Education Overview

CSC researchers, scientists, and experts are leaders in resolving the most challenging and sophisticated cyber security issues. As faculty, they share proven knowledge, expertise, and skills in the field of cyber security.

Value:

Improve critical-thinking skills to overcome current and future challenges Study using our curriculum based on individual audiences and successfully contribute in constructing a cyber-resistant business

Receive a respected qualification from a distinguished university (the CSC offer cyber security professional education in cooperation with AUBiH)

Education Overview

CSC researchers, scientists, and experts are leaders in resolving the most challenging and sophisticated cyber security issues. As faculty, they share proven knowledge, expertise, and skills in the field of cyber security.

Value:

Improve critical-thinking skills to overcome current and future challenges Study using our curriculum based on individual audiences and successfully contribute in constructing a cyber-resistant business

Receive a respected qualification from a distinguished university (the CSC offer cyber security professional education in cooperation with AUBiH)

Convenience:

The CSC offers different training opportunities to meet your education goals:

Teacher-led seminars & training

Online virtual seminars & training

Customized seminars & training for your business

Private courses

On-site seminars & training

Profesional Training

Constant changes in cyber security landscape are forcing users to continually educate themselves about the most recent threats. Attending seminars and trainings at the CSC helps you stay at the cutting-edge of knowledge and receive the best quality education.

Experts in the field of cyber security at the CSC are ready to share their cyber security knowledge, skills, and techniques by teaching seminars and trainings. Our seminar and training courses emphasis skills and techniques to challenge complex issues and create advanced solutions. Cyber security seminars and trainings are intended for executives, directors, managers, and other employees who are interested to advance the knowledge regarding cyber security.

The CSC individualy-tailored trainings and seminars for users, organizations, and government agencies in the chosen module. The customized seminars and trainings simply cover business-related information, in shorter sessions at the cheaper class rate. In essence, all modules are designed to meet the customer’s specific training objectives and create value for the participants’ professional development.

Profesional Education

Established on a distinctive layout, combining conventional instruction with group learning, online education, and classroom collaborations, the Certificates, Master Degree, and Doctoral Degree programs close anexisting gap in the SEE higher education academic offerings for information security professionals.


Seminars & Certification

Constant changes in cyber security landscape are forcing users to continually educate themselves about the most recent threats. Attending seminars and trainings at CSC helps you stay at the cutting-edge and receive the best quality education.

Experts in the field of cyber security at CSC are ready to share their cyber security knowledge, skills, and techniques by teaching seminars and trainings. Our seminar and training courses emphasis skills and techniques to challenge complex issues and create advanced solutions.

Seminars & Certification

Constant changes in cyber security landscape are forcing users to continually educate themselves about the most recent threats. Attending seminars and trainings at CSC helps you stay at the cutting-edge and receive the best quality education.

Experts in the field of cyber security at CSC are ready to share their cyber security knowledge, skills, and techniques by teaching seminars and trainings. Our seminar and training courses emphasis skills and techniques to challenge complex issues and create advanced solutions.

Cyber security seminars and trainings are intended for executives, directors, managers, and other employees who are interested to advance the knowledge regarding cyber security.

CSC is aware that “one size does not fit all”. We provide business-tailored trainings and seminars for users, organizations, and government agencies in the chosen module. The customized seminars & trainings simply cover business-related information, in shorter sessions at the cheaper class rate. In essence, all modules are designed to meet the customer’s specific training objectives and create value for the participants’ professional development.


Some of the most frequently offered seminars and trainings include:

Security Awareness Training

Cyber security Policies & Procedures

Disaster Recovery

Malware and Other Emerging Threats

Emerging Technologies

Incident Response and Business Continuity Planning

Computer Emergency Response Teams and their Responsibilities

Access Control and Authentication

Insider Threats

Advanced Persistent Threats

Professional Training

Constant changes in cyber security landscape are forcing users to continually educate themselves about the most recent threats. Attending seminars and trainings at the CSC helps you stay at the cutting-edge and receive the best quality education.

Experts in the field of cyber security at the CSC are ready to share their cyber security knowledge, skills, and techniques by teaching seminars and trainings. Our seminar and training courses emphasis skills and techniques to challenge complex issues and create advanced solutions. Cyber security seminars and trainings are intended for executives, directors, managers, and other employees who are interested to advance the knowledge regarding cyber security.

The CSC individualy-tailored trainings and seminars for users, organizations, and government agencies in the chosen module. The customized seminars and trainings simply cover business-related information, in shorter sessions at the cheaper class rate. In essence, all modules are designed to meet the customer’s specific training objectives and create value for the participants’ professional development.

Digital Forensics

Overview
Course Description

The Certificate in Digital Forensics responds to the growing need of experts in digital forensics. This certificate is developed to provide students with skills and knowledge about the world of cybercrime, cybersecurity and threats as well as a framework how to secure and protect cyber assets and perform digital forensics.The program comprises of compulsory courses. Students acquire a title of Certificate in Digital Forensics.

Course Prefix Course Title US Credits ECTS Credits
Semester I
CSA 580 Research Methodology and Project Preparation 1 2
CSA 581 Cyber Security Standards and Policies 2 4
CSA 584 Computer and System Intrusion 2.5 5
CSA 591 Law in Cyber Crime 2 4
CSA 592 Digital Forensics 2 4
TOTAL CREDITS: 9 18

CSA 580 Research Methodology and Project Preparation

This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.


CSA 581 Cyber Security Standards and Policies

The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 584 Computer and System Intrusion

This course teaches students about computer and system intrusion, types of intrusion, its detection as well as prevention systems and its classifications. In addition methods and tactics used in prevention of the intrusion will be covered. The course will also cover the following topics: hacking, E-Crime (or cyber crime) and e-Discovery. Hacking involves finding out weaknesses in a computer or computer network. Classifications, tools and techniques of hacking are covered. E-Crime or (or cyber crime) refers to any crime that involves a computer and a network. E-Discovery refers to discovery in civil litigation, which deals with the exchange of information in electronic format. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 591 Law in Cyber Crime

This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 592 Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The course explores digital forensics, its history, forensic process, application, legal considerations and branches. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence. Digital forensics investigations have a variety of applications. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: a) computer forensics, b) network forensics, c) database forensics and d) mobile device forensics. Computer forensics pertains to legal evidence found in computers and digital storage media. Network forensics relates to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Database forensics relates to the forensic study of databases and their metadata. Mobile device forensics relates to recovery of digital evidence or data from a mobile device. Credits: ECTS: 4 US: 2. Prerequisite: None.


Network Security

Overview
Course Description

The Certificate in Network security responds to the growing need of experts in cyber security, especially network security. This certificate is developed to provide students with skills and knowledge about the network security, legal aspects, standards and policies, and industrial network security. The program comprises of compulsory courses. Students acquire a title of Certificate in Network Security.

Course Prefix Course Title US Credits ECTS Credits
Semester I
CSA 580 Research Methodology and Project Preparation 1 2
CSA 581 Cyber Security Standards and Policies 2 4
CSA 583 Network Security 2.5 5
CSA 591 Law in Cyber Crime 2 4
CSA 593 Industrial Network Security 2 4
TOTAL CREDITS: 9.5 19

CSA 580 Research Methodology and Project Preparation

This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.


CSA 581 Cyber Security Standards and Policies

The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 591 Law in Cyber Crime

This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 593 Industrial Network Security

This course teaches students about industrial network security. Students will study about industrial network, its protocol, how it operates, application characteristics of an industrial control system, as well as a variety of common compliance controls. Students will learn to identify why security controls should be implemented, where they should implemented, how they should be implemented, and how they should be used. Topics covered include how secure enclaves are established, monitored, anomaly and threat detection, standards and regulations applicable to industrial network security, as well as common mistakes and pitfalls that occur within industrial control system. Credits: ECTS: 4 US: 2. Prerequisite: None.


Wireless Security

Overview
Course Description

The Certificate in Wireless Security responds to the growing need of experts in cyber security, especially wireless security. This certificate is developed to provide students with skills and knowledge about the wireless security, legal aspects, standards and policies, and industrial network security. The program comprises of compulsory courses. Students acquire a title of Certificate in Wireless Security.

Course Prefix Course Title US Credits ECTS Credits
Semester I
CSA 580 Research Methodology and Project Preparation 1 2
CSA 581 Cyber Security Standards and Policies 2 4
CSA 582 Telecommunication and Data Communication 2.5 5
CSA 585 Wireless Security 2 4
CSA 591 Law in Cyber Crime 2 4
TOTAL CREDITS: 9.5 19

CSA 580 Research Methodology and Project Preparation

This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.


CSA 581 Cyber Security Standards and Policies

The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 582 Telecommunication and Data Communication

This course teaches students about fundamentals of the technology, transmission systems, voice communication systems, messaging systems, and public switched telephone network. Student will also learn about fundamentals of data communications, conventional digital and data networks, local area networks, broadband network infrastructure and services, wireless networking with the emphasis on mobility, video and multimedia networking, the Internet and World Wide Web, network convergence. The course also covers regulation such as Telecommunications Act of 1996 as well as certain issues. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 585 Wireless Security

This course teaches students about wireless security. The risks to users of wireless technology have increased as the service has become more popular. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The course emphases that wireless security policies should be defined by enterprises in order to prevent unauthorized access to important resources. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 591 Law in Cyber Crime

This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


Professional Education

Established on a distinctive layout, combining conventional instruction with group learning, online education, and classroom collaborations, the Certificates, Master Degree, and Doctoral Degree programs close anexisting gap in the SEE higher education academic offerings for information security professionals.

Master Of Cyber Security

Overview
Course Description

The master’s program in Cyber Security lasts one year and responds to the growing need of experts in cyber security. The goal of a Cyber Security program is for students to acquire knowledge in the field of cyber security through cyber security standards and policies, information security, network and internet security, telecommunication and data communication, wireless security, computer and system intrusion, mobile devices security. The program comprises of mandatory courses and writing of a master's thesis. Students acquire a title of Masterof Cyber Security.

Course Prefix Course Title US Credits ECTS Credits
Semester I
CSA 580 Research Methodology and Project Preparation 1 2
CSA 581 Cyber Security Standards and Policies 2 4
CSA 582 Telecommunication and Data Communication 2.5 5
CSA 583 Network Security 2.5 5
CSA 584 Computer and System Intrusion 2.5 5
CSA 585 Wireless Security 2 4
CSA 586 Information Security 2.5 5
Semester II
CSA 590 Mobile Devices Security 2 4
CSA 591 Law in Cyber Crime 2 4
CSA 592 Digital Forensics 2 4
CSA 593 Industrial Network Security 2 4
CSA 594 Internet Security 2 4
CSA 595 Cyber Surveillance 2 4
CSA 600 Master's Project: Cyber Security 3 6
TOTAL CREDITS: 30 60

CSA 580 Research Methodology and Project Preparation

This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.


CSA 581 Cyber Security Standards and Policies

The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 582 Telecommunication and Data Communication

This course teaches students about fundamentals of the technology, transmission systems, voice communication systems, messaging systems, and public switched telephone network. Student will also learn about fundamentals of data communications, conventional digital and data networks, local area networks, broadband network infrastructure and services, wireless networking with the emphasis on mobility, video and multimedia networking, the Internet and World Wide Web, network convergence. The course also covers regulation such as Telecommunications Act of 1996 as well as certain issues. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 583 Network Security

This course teaches students about network security whose main purpose is to secure the network, and protect and oversee operations being done. Network security is involved in organizations, enterprises, and other types of institutions. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Students will be introduced to the provisions and policies that are an integral part of network security. Network administrator adopts those provisions and policies in order to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. This also involves the authorization of access to data in a network. The course introduces students to intrusion detection system and intrusion prevention systems and their main differences. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 584 Computer and System Intrusion

This course teaches students about computer and system intrusion, types of intrusion, its detection as well as prevention systems and its classifications. In addition methods and tactics used in prevention of the intrusion will be covered. The course will also cover the following topics: hacking, E-Crime (or cyber crime) and e-Discovery. Hacking involves finding out weaknesses in a computer or computer network. Classifications, tools and techniques of hacking are covered. E-Crime or (or cyber crime) refers to any crime that involves a computer and a network. E-Discovery refers to discovery in civil litigation, which deals with the exchange of information in electronic format. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 585 Wireless Security

This course teaches students about wireless security. The risks to users of wireless technology have increased as the service has become more popular. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The course emphases that wireless security policies should be defined by enterprises in order to prevent unauthorized access to important resources. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 586 Information Security

The course teaches students about information security as well as information assurance. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Information security is concerned with the confidentiality, integrity and availability of data and systems regardless of the form the data may take: electronic, print, or other forms. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. The course also teaches about physical, electromagnetic (TEMPEST) and personal security. Physical security refers to protection of information systems. Personal security refers to personal security clearance and screening, their scope of action, ect. Credits: ECTS: 5 US: 2,5. Prerequisite: None.


CSA 590 Mobile Devices Security

The course teaches students about mobile devices security. Mobile devices security relates to the security of personal information stored on smartphones. Smartphones, used as communication tools and a means of planning and organizing professional (work) and private life are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, Wi-Fi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. There are also are forms of malicious software that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end-users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable applications. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 591 Law in Cyber Crime

This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 592 Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The course explores digital forensics, its history, forensic process, application, legal considerations and branches. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence. Digital forensics investigations have a variety of applications. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: a) computer forensics, b) network forensics, c) database forensics and d) mobile device forensics. Computer forensics pertains to legal evidence found in computers and digital storage media. Network forensics relates to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Database forensics relates to the forensic study of databases and their metadata. Mobile device forensics relates to recovery of digital evidence or data from a mobile device. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 593 Industrial Network Security

This course teaches students about industrial network security. Students will study about industrial network, its protocol, how it operates, application characteristics of an industrial control system, as well as a variety of common compliance controls. Students will learn to identify why security controls should be implemented, where they should implemented, how they should be implemented, and how they should be used. Topics covered include how secure enclaves are established, monitored, anomaly and threat detection, standards and regulations applicable to industrial network security, as well as common mistakes and pitfalls that occur within industrial control system. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 594 Internet Security

This course teaches students about Internet security. Internet security involves browser security and network security on a more general level as it applies to other applications or operating systems on a whole. Objective of Internet security is to establish rules and measures in order to use it against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. Topics covered in the course include: a) Types of security (network layer security, IPsec Protocol, security token, E-mail security); b) Firewalls (their role, types, ect.); c) Malicious software and antivirus; d) different types of attack; e) security management of Web applications and Web services; ect. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 595 Cyber Surveillance

The course introduces students to cyber surveillance, a technique for monitoring computer activity, which includes monitoring of date stored on a hard drive or being transferred over computer networks. Cyber surveillance operates on data networks. Cyber surveillance also includes gathering and analyzing information recorded. Students will be also introduced to surveillance and security as a study, surveillance theories as well as with types of cyber surveillance. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 600 Master’s Project: Cyber Security

Credits: ECTS: 6 US: 3. Prerequisite: CSA 580 Research Methodology and Project Preparation.


Doctoral Degree In Cyber Security

Overview
Course Description

The doctoral degree program in Cyber Security is athree-year program, which consists of courses, seminars and writing and defending of the doctoral thesis. The goal of doctoral degree program in Cyber Security is for student to acquire knowledge in the field of cyber security through studying the following at an advance level: cyber security standards and policies, information security, industrial and corporate network security, law in cyber crime, digital forensics, telecommunication and data communication, computer and system intrusion, malicious software development, mobile devices security, cryptography, electronic and cyber surveillance.


The program prepares doctoral students for either academic and research careers or for executive positions in the public or private sectors. Program presents combination of course work and research. Students attend courses that cover a wide range of subjects that focus on cyber security. The program assists in meeting the national demand for information security professionals trained to defend institutions in cyberspace.Students acquire a title of Doctor of Science in Cyber Security.

Course Prefix Course Title US Credits ECTS Credits
Semester I
CSA 680 Advanced Research Methodology 3 6
CSA 681 Advanced Cyber Security Standards and Policies 4 8
CSA 682 Advanced Telecommunication and Data Communication 4 8
CSA 686 Advanced Information Security 4 8
Total Credits: 15 30
Semester II
CSA 690 Advanced Mobile Devices Security 4 8
CSA 691 Advanced Law in Cyber Crime 4 8
CSA 692 Advanced Digital Forensics 4 8
CSA 693 Advanced Industrial Network Security 3 6
Total Credits: 15 30
Semester III
CSA 684 Advanced Computer and System Intrusion 4 8
CSA 683 Advanced Corporate Network Security 4 8
CSA 685 Advanced Cryptography Development 4 8
CSA 696 Preparation for a doctoral dissertation (1st phase) 3 6
Total Credits: 15 30
Semester IV
CSA 695 Advanced Cyber Surveillance 4 8
CSA 699 Advanced Malicious Software Development 4 8
CSA 697 Conference participation and/or publication of a research in a relevant peer-reviewed journal 7 14
Total Credits: 30 60
Semester V
CSA 698 Doctoral dissertation - writing of the final version 15 30
Total Credits: 15 30
TOTAL CREDITS: 90 180

CSA 680 Advanced Research Methodology

This advanced course consists of two parts. During the first part of the course the theories of inference underlying most statistical methods are introduced. This part of the course also covers how new approaches to research methods, data analysis, and statistical theory are developed. With this foundation, we introduce (and reinvent) a wide variety of known statistical solutions to a wide range of social science data problems. We also show how it is easy to conceive original approaches and new statistical estimators when required. The specific models introduced are chosen based on students' research topics. The second part of this advanced course is about qualitative data collection, which addresses both theoretical and practical dimensions of conducting qualitative research. Data collection concerns are embedded within the larger processes of qualitative research methods and must be considered in holistic ways. For example, data collection decisions are inherently tied to particular epistemological stances and theoretical orientations as well as to the research focus. In addition, data collection processes are interwoven with analysis and often occur simultaneously. Postgraduate students will acquire the knowledge and methodological skills that are part of qualitative research methods for application within their academic program, for writing a dissertation and/or for their future career. The course is designed with flexibility so that you will be able to develop projects that will suit your own academic and professional needs. Credits: ECTS: 6 US: 3. Prerequisite: None.


CSA 681 Advanced Cyber Security Standards and Policies

The course teaches students about cyber security standards and policies at advanced level. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 682 Advanced Telecommunication and Data Communication

This advanced course teaches students about fundamentals of the technology, transmission systems, voice communication systems, messaging systems, and public switched telephone network. Student will also learn about fundamentals of data communications, conventional digital and data networks, local area networks, broadband network infrastructure and services, wireless networking with the emphasis on mobility, video and multimedia networking, the Internet and World Wide Web, network convergence. The course also covers regulation such as Telecommunications Act of 1996 as well as certain issues. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 686 Advanced Information Security

The course teaches students about information security as well as information assurance at advanced level. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Information security is concerned with the confidentiality, integrity and availability of data and systems regardless of the form the data may take: electronic, print, or other forms. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. The course also teaches about physical, electromagnetic (TEMPEST) and personal security. Physical security refers to protection of information systems. Personal security refers to personal security clearance and screening, their scope of action, ect. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 690 Advanced Mobile Devices Security

The advanced course teaches students about mobile devices security. Mobile devices security relates to the security of personal information stored on smartphones. Smartphones, used as communication tools and a means of planning and organizing professional (work) and private life are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, Wi-Fi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. There are also are forms of malicious software that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end-users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable applications. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 585 Wireless Security

This course teaches students about wireless security. The risks to users of wireless technology have increased as the service has become more popular. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The course emphases that wireless security policies should be defined by enterprises in order to prevent unauthorized access to important resources. Credits: ECTS: 4 US: 2. Prerequisite: None.


CSA 691 Advanced Law in Cyber Crime

This advanced course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 692 Advanced Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The advanced course explores digital forensics, its history, forensic process, application, legal considerations and branches. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence. Digital forensics investigations have a variety of applications. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: a) computer forensics, b) network forensics, c) database forensics and d) mobile device forensics. Computer forensics pertains to legal evidence found in computers and digital storage media. Network forensics relates to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Database forensics relates to the forensic study of databases and their metadata. Mobile device forensics relates to recovery of digital evidence or data from a mobile device. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 693 Advanced Industrial Network Security

This course teaches students about industrial network security at advanced level. Students will study about industrial network, its protocol, how it operates, application characteristics of an industrial control system, as well as a variety of common compliance controls. Students will learn to identify why security controls should be implemented, where they should implemented, how they should be implemented, and how they should be used. Topics covered include how secure enclaves are established, monitored, anomaly and threat detection, standards and regulations applicable to industrial network security, as well as common mistakes and pitfalls that occur within industrial control system. Credits: ECTS: 6 US: 3. Prerequisite: None.


CSA 684 Advanced Computer and System Intrusion

The advanced course teaches students about computer and system intrusion, types of intrusion, its detection as well as prevention systems and its classifications. In addition methods and tactics used in prevention of the intrusion will be covered. The course will also cover the following topics: hacking, E-Crime (or cyber crime) and e-Discovery. Hacking involves finding out weaknesses in a computer or computer network. Classifications, tools and techniques of hacking are covered. E-Crime or (or cyber crime) refers to any crime that involves a computer and a network. E-Discovery refers to discovery in civil litigation, which deals with the exchange of information in electronic format. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 683 Advanced Corporate Network Security

The advanced course consists of three parts. The first part of the course teaches students about network security whose main purpose is to secure the network, and protect and oversee operations being done. Network security is involved in organizations, enterprises, and other types of institutions. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Students will be introduced to the provisions and policies that are an integral part of network security. Network administrator adopts those provisions and policies in order to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. This also involves the authorization of access to data in a network. The course introduces students to intrusion detection system and intrusion prevention systems and their main differences. The second part of the course teaches students about wireless security. The risks to users of wireless technology have increased as the service has become more popular. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The course emphases that wireless security policies should be defined by enterprises in order to prevent unauthorized access to important resources. The third part of the course teaches students about Internet security. Internet security involves browser security and network security on a more general level as it applies to other applications or operating systems on a whole. Objective of Internet security is to establish rules and measures in order to use it against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. Topics covered in the course include: a) Types of security (network layer security, IPsec Protocol, security token, E-mail security); b) Firewalls (their role, types, ect.); c) Malicious software and antivirus; d) different types of attack; e) security management of Web applications and Web services; ect. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 685 Advanced Cryptography Development

Cryptography is the study of information hiding and verification. It includes the protocols, algorithms and strategies to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication. A review of the historical development of cryptographic methods and cryptanalysis tools is provided. The advanced course covers encryption programming and decoding, conventional encryption model, classical encryption techniques - substitution ciphers and transposition ciphers, cryptanalysis, stereography, stream and block ciphers. When information is transformed from a useful form of understanding to an opaque form of understanding, this is called encryption. When the information is reverted back into a useful form, it is called decryption. Data encryption protect data from prying eyes, prevents unauthorized users from transmitting confidential data to the wrong party or performing any modifications to the data. Data encryption works through a coding process to prevent documents, email messages, and other types of information from being accessed by unauthorized users. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. The encryption program can be included in an email client or can be a stand-alone infrastructure. The encryption process, which is known in IT programming as an algorithm, is responsible for the conversion of data that is encrypted. The data is then accessed through an encryption key that the end user uses to access and read the data. The course will cover types of algorithms and methods of encryption. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 696 Preparation for a doctoral dissertation (1st phase)

The candidate is assigned a provisional supervisor who will help him/her to identify a suitable dissertation topic. The candidate submits an outline containing problem definition, research questions, methodology adopted and references consulted. The candidate presents his/her work in dedicated seminars. Credits: ECTS: 6 US: 3. Prerequisite: None.


CSA 695 Advanced Cyber Surveillance

This advanced course introduces students to cyber surveillance, a technique for monitoring computer activity, which includes monitoring of date stored on a hard drive or being transferred over computer networks. Cyber surveillance operates on data networks. Cyber surveillance also includes gathering and analyzing information recorded. Students will be also introduced to surveillance and security as a study, surveillance theories as well as with types of cyber surveillance. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 699 Advanced Malicious Software Development

The advanced course teaches students about malicious software also known as malware as well as its development. It is software designed to disrupt computer operation, gather sensitive information, and gain unauthorized access to a computer system. Malware includes computer viruses, worms, trojan horses, spyware, adware, most rootkits, and other malicious programs. Students will be introduced to distributed firewalls and some types of malicious programs (for example SMART HDD). Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. Construction of malicious software will be explained, how they function and spread as well as how anti-malicious software and hardware work. Credits: ECTS: 8 US: 4. Prerequisite: None.


CSA 697 Conference participation and/or publication of a research in a relevant peer-reviewed journal

Credits: ECTS: 14 US: 7. Prerequisite: None.


CSA 698 Doctoral dissertation – writing of the final version

Students will devote this semester to completing their dissertations. During this time the candidates are requested to present their work in dedicated seminars/workshops.Candidates can submit their dissertations after three academic years. Credits: ECTS: 30 US: 15. Prerequisite: None.


CSA 700 Doctoral dissertation – oral defense

Upon approval by the Supervisor and Defense Committee the candidate defends the dissertation and fulfills all requirements for obtaining the AUBiH doctoral degree. Credits: ECTS: 30 US: 15. Prerequisite: CSA 698 Doctoral dissertation – writing of the final version.