BWSI Course - Cyber Security in Software Intensive Systems

Program Overview

Beaver Works Summer Institute will help students learn and understand cyber security. Software   is   pervasive   and   everyday   reliance   on   software-intensive   systems   by individuals,  businesses,  industries,  and  governments  is  only  increasing.  The  many benefits of using software, however, come at a price: the cyber threats are real, and their impacts can be devastating. This course will introduce students to the fundamentals of cybersecurity  and  then   go  over  real-world  cybersecurity  threats  and  students  will  be challenged to develop ways to mitigate them.

 

 

 

 

 

 

Online Course

The online component for the Cybersecurity of Software Intensive Systems course runs from January to May and is open to all interested students. It contains important introductory material to provide students with the background required to successfully complete the four-week summer course. The following modules will be covered.

  • The Bascis of Cybersecurity
  • Programming in Python
  • Programming in C
  • Assembly
  • Basics of Computer Networking
  • Basics of Cryptography
  • Introduction to Usable Security

Summer Course

The four-week summer program runs from beginning to end of July for a select group of  students, and it is focused on a study of a distributed system providing a service to common users like you. The course will consist of a mix of lectures and hands-on exercises that reinforce and apply the material. Teams of BWSI students will design and implement their own aspects of this system to address typical cybersecurity threats that services encounter in real life. Each team will be given an opportunity to assess other teams’ designs. The following is the outline for the summer course:

Course Outline

Week 1: Distributed Systems

•   Distributed system fundamentals
•   Dependability
•   Design challenge introduction

Week 2: Cybersecurity Fundamentals
•   Network security
•   Applied cryptography

Week 3: Vulnerability Assessment
•   Bug classes
•   Fuzzing
•   Reverse engineering

Week 4: Human Aspects of Cybersecurity
•   Social engineering and usable security
•   Finalize design and assessments