Undergraduate Engineering Curriculum
Undergraduates in the ICSSP program must be pursuing a bachelor’s degree either through the B.S. in Computer Science program in the Siebel School of Computing and Data Science or through the Department of Electrical and Computer Engineering. Depending on their home degree programs, students will follow the course sequences outlined below. These sequences specify the courses ICSSP participants must complete for the ICSSP program. For more details, please refer to the degree program “technical elective” requirements. Participants who are in the non-CE program in ECE need to email iti-icssp-info@illinois.edu for more information on the curriculum. Course requirements are subject to change.
NOTE: In participating in the ICSSP program, participants will not be required to take additional coursework hours beyond the existing program requirements. The ICSSP requirements are designed to fit into the technical elective sequence.
Course Requirements for Both CS and ECE Undergraduate Participants
NOTE: All grades in all ICSSP coursework must be a “B” or higher.
Satisfy the core requirements of the Bachelor of Science curriculum either in CS or ECE.
- You must take all of the following core courses in security:
- CS 461/ECE 422 – Computer Security I
- CS 463/ECE 424 – Computer Security II
- CS 491 – Information Assurance and Trust Seminar (must register for this seminar each semester)
- In addition, you must take:
- CS 210: Ethical and Professional Issues, or ECE 316: Engineering Ethics.
- Each scholar is required to complete two relevant two-course technical concentration sequences (that is, each sequence consists of two courses listed under the same bolded heading below). Students should select sequences from the suggested list or obtain approval from Prof. Bashir. If you would like to propose a custom two-course sequence, please provide a justification to explain how the two courses within that sequence complement each other and form a coherent focus area. (A list of security-related courses at UIUC is available online.)
- Applied Cryptography:
- Human Aspects of Security & Privacy:
- CS 462 Issues of Law and Policy in Computer Science (SP26)
- CS 464 Topics in Societal and Ethical Impacts of Computer Technology (FA25: CD1 Cyber Dystopia)
- CS 465 User Interface Design (FA25)
- CS 467 Social Visualization
- CS 470 Social and Information Networks (FA25)
- CS 498 RC Law & Policy Issues in CS (FA25)
- CS 562 Advanced Topics in Security, Privacy, and Machine Learning (FA25)
- CS 563 Advanced Computer Security
- CS 565 Human-Computer Interaction
- CS 567 Social Signals and Social Media
- CS 591 IC Interactive Computing (FA25)
- CS 591 SP Security and Privacy (FA25)
- CS 598 CAC Inclusive Cybersecurity & Privacy
- CS 598 CAG Security and Privacy for IoT in Homes
- CS 598 ECH or RBO Antisocial Computing
- CS 598 UCP Usable Cybersecurity & Privacy
- ECE 479 IoT and Cognitive Computing
- ECE 598 DI Digital Identity
- ECE 598 DP Deploying Privacy (SP26)
- INFO 390 JB Information Security & Global Society
- INFO 490 JBG/JBU Digital Forensics II (SP26)
- INFO 490 DFU/DFG Digital Forensics I (FA25)
- INFO 490 Fundamentals of Info Security
- IS 364 Privacy and Info Technology
- IS 390 BS Blockchain and Society (FA25)
- IS 464 Information Assurance
- IS 467 Ethics and Policy for Data Science (FA25)
- IS 524 Data Governance
- IS 584 IFC Int. Freedom and Censorship (SP26)
- IS 584 PVO Privacy in the Internet Age (FA25)
- IS 594 IPO Information Policy
- IS 597 HCD Human Centered Data Science (FA25)
- IS 597 TML Trustworthy Machine Learning
- Machine Learning and Artificial Intelligence:
- CS 441 Applied Machine Learning (FA25)
- CS 442 Trustworthy Machine Learning
- CS 446/ECE 449 Machine Learning (FA25)
- CS 521 FMC Formal Methods and Machine Learning in Programming Systems (FA25)
- CS 521 LCC Machine Learning and Compilers (FA25)
- CS 540 Deep Learning Theory (FA25)
- CS 547 Deep Learning
- CS 568 User-Centered Machine Learning
- CS 598 BL: Adversarial Machine Learning
- IS 492 AIG Introduction to Gen AI for Human-AI Collaboration (FA25)
- Data, Systems, and Cyberinfrastructures:
- CS 341 System Programming (FA25)
- CS 411 Database Systems (FA25)
- CS 412 Introduction to Data Mining (FA25)
- CS 423 Operating Systems Design (FA25)
- CS 427 Software Engineering I (FA25)
- CS 425/ECE 428 Distributed Systems (FA25)
- CS 438/ECE 438 Communication Networks (FA25)
- CS 439/ECE 439 Wireless Networks (FA25)
- CS 511 Advanced Data Management (FA25)
- CS 512 Data Mining Principles (FA25)
- CS 598 AB Endpoint Threat Detection and Investigation
- CS 598 DH Secure Computation
- CS 598 EKS Smart Cities, Homes & Beyond (SP26)
- CS 598 OSS Operating System Security
- ECE 365 Data Science and Engineering (FA25)
- ECE 484 Principles of Safe Autonomy (FA25)
- ECE 498 AL3 / ECE 598 AL1 Trust Critical Infrastructures (FA25)
- ECE 542/CS 536 Design of Fault-Tolerant Digital Systems
- ECE 573 Power System Control
- ECE/CS 584 Embedded System Verification (FA25)
- ENG 498 FSA Foundations in Secure Systems Administration (SP26)
- ENG 498 FSN Foundations in Secure Networking for Cyber-Social Systems
- IS 496 CN3 Computer Networks
- Approved Track: Students may work with Professor Bashir and the ICSSP leadership team to create an approved concentration area.
- Complete a summer internship in a government organization, such as a National Laboratory, the National Security Agency, the Department of Defense, the National Standards Institute, or a computing facility (only for participants who are awarded a two- or three-year scholarship).
- Complete two semesters of research/project in senior year by completing one of the following sequences below. All students must complete research/project in the area of cyber security working in collaboration with an advisor from the Information Trust Institute.
- Produce a research paper of publishable quality over your final year in the program. Satisfactory progress has to be made each semester towards this goal and progress report for the research project must be submitted at the end of each semester. Independent study credits will be available for satisfying this requirement. An advisor must be approved by ICSSP leadership, and a research abstract must be submitted and approved by the end of the student¹s first semester. You may you IEEE or ACM template.
- CS 492 – Senior Project, or
- ECE 445 – Senior Design Project Laboratory.
Senior Thesis-Project Agreement Form
Summary
CS B.S. Degree, ICSSP Requirements (see CS department B.S. requirements)
|
CE B.S. Degree, ICSSP Requirements (see departmental CE B.S. requirements)
|
| The 23 hours of CS technical electives include:
|
The 23 hours of CE technical electives include:
|
| 12 hours of free electives | 12 hours of free electives |
Transfer Students
To be eligible to apply for the scholarship, transfer students must have been admitted to the UIUC College of Engineering and have completed at least one semester on campus. They must provide a transcript of their past coursework to ICSSP so that ICSSP can evaluate it and determine what non-UI courses can be accepted as substitutes for the normally required courses.
NOTE: Some modifications to the required course sequences may be possible if your academic background makes it difficult or inappropriate for you to follow all of the stated requirements. Your ICSSP advisor can work with you to find solutions.