This was my first class in the OMSCybersecurity program, and it was both easier and harder than I had expected. I have a Comp Sci undergrad, but it's been some time since I've been in any academic program and rather have spent my life working full time in development roles, most recently in a large company writing security software where I interact both with customers who want to protect THEIR company, and internal IR and SOC teams protecting OUR company.
overview
The class is an amalgam of computer science subjects, haphazardly thrown together under the idea that this is an "overview" of information security. I'm told that the entire Cybersecurity program is like this; a set of the Comp Sci program that happens to tangentially relate to security. Hopefully this will get better over time.
This class, given the projects, is COMPLETELY inappropriate for the Policy track, and maybe even the Energy track.
It is, perhaps, best described as a good hazing intro to the land of OMS courses.
"classroom" instruction
The classroom lectures are a mix of Drs Lee and Ahamad. Dr. Ahamad spends way too much time circling around the subject, and I found myself using the video speed control at 1.5x most of the time. In a lot of cases I just skipped the video altogether and just read the transcripts, although some of the slides appear over time so there is a possibility of missing things.
Dr. Lee is much more direct, although I found his accent a bit hard to grok so had to slow his down some.
This is, as I will note later, about the ONLY interaction with the professors you will have.
content
Other than the fact that the subject matter is thrown together, I found it mostly engaging. There are some really, really dry spots (like the common criteria sections), but the content copies mostly (80%) from the book and where they don't, are largely complimentary.
I found the book worthwhile and spent a majority of my "input" time there rather than the videos, which I used to get an idea of what portion of the book to concentrate studies on.
projects
There are 4 projects, 3 of which require either coding or knowledge of coding. Project 1 is to provide data for a program to get it to buffer overflow. While I feel having the knowledge of buffer overflow is absolutely useful, this project was bizarrely oriented to topics and tasks that don't enforce the concept. You will need some non-trivial gdb
knowledge to debug your way through the project, which was presented by the TA's as some sort of secret knowledge passed in guild-like fashion from master to apprentice, and only when worthy.
Too, there is a "magic nugget" that must be deduced from the documentation that is easy to miss, and if you do, makes the project uncomplete-able. Which was one of my 2 biggest gripes about this project specifically, and all of them in general. In order to ramp up the "difficulty" of the project to fit the TA's "this is a graduate level course" narrative (more on this later), instead of taking time to design a good project they use this hack solution of adding an element that doesn't teach the concept, doesn't help understanding, and is simply an irritant.
For example, one person posted a handy guide to gdb
, without even mentioning which of the 100 or so commands on it were useful. It was removed, and the student scolded for posting it. This project was NOT ABOUT gdb
! Way to miss the point, TA.
Project 2 was mostly pointless. You run an analysis script over malware samples, and try to grok its output to answer questions. This was the most "busywork" project of the 4. This one was so forgettable that I had to go back to my project directories to even see what it was to write this review.
Project 3 was using Python to code various aspects surrounding an asymmetric encryption program. This one was the project I felt I got the most out of. I'll never code one of these ever again, but it did mostly use the coding exercises to illustrate interesting points of the algorithms; pitfalls, strengths, why things work and why they don't. Whichever TA designed this one gets my admiration. (Although one of the writeup questions asks a question in so vague a manner that a vast % of students got points off even though the content was correct. If slack/piazza was any guide, by this point most of them/us have given up trying to reason with the TAs about it. See below.)
Project 4 uses PHP to illustrate a badly written "banking" site, and given the source code the student is asked to break it in several ways. Like project 3, this one uses code and exercises to illustrate and teach various points. Beware the autograder, however; points will be removed for things that work perfectly on your machine but fail the autograder. Because a regrade of one of the tests wouldn't have affected my final grade, and this was the last project, my auto-grade request was denied so I don't know what aspect of my submission "failed" the grader (but worked locally) in the provided VM.
It is PAINFULLY obvious that the projects were designed by different people. The style and specificity of questions, the rigor in putting them together, the level of sadism in hiding the inevitable "trick" that if found makes the project trivial, and if not, impossible, etc. was WILDLY different among them.
tests and quizzes
Quizzes were open book, single-attempt, and 1 hour long. (I'm told the single attempt aspect is a change from previous semesters) They took generally way less time than that, and mostly could be looked up easily in the material. One took the class by surprise and got a much lower average score. My suspicion is the TA's were trying to be clever with the questions on this one.
The 2 tests where T/F and MC, and were not overly surprising in content. Test 2 actually took some questions from student-written study guides, which I felt was a nice touch. The questions I got wrong, I felt I got legitimately wrong, with only a few instances of TA's being deliberate in trying to trick the student.
That said, the non-student questions were taken right from the book. Sometimes with a word or 2 changed, to completely reverse the meaning of the phrase. This is just more TA laziness; making the material APPARENTLY "hard" without actually trying to put the work in to test the student's knowledge. It was mentioned in slack several times that this sort of pickyness would not happen, but it did.
That there are only 2 for the entire course is just more laziness, however. A 4 exam semester would have alleviated much of the intense cramming that people had to fall back on. Even 3 would have helped.
Personnel/Interaction
As I've mentioned before, my view of how the TA's operated is on the fence.
I used slack more than Piazza as it was way more interactive, and the TA's were more responsive and candid.
There were 2 TA's that were the bulk of the interaction. One was quite chatty and friendly, the other mostly superior and standoffish, although both were "around" a lot, which is helpful.
My biggest issue with this class, is that it is TA run. That in itself is not a problem, but the TAs that run it are mostly absent (I think one of the Canvas pages showed something like 8-10 TAs, but we only interacted with 2 on a regular basis, and maybe saw another 2 or 3 of them once or twice during the semester), and none of them have actual professional teaching experience.
Here's what this led to.
- No problems with "chatty" (although I get the impression he was asked to tone it down for getting too friendly? Not in any untowards manner, but he got very "professional" later in the semester and mentioned some sort of wrist slap from on-high).
- "surly" was outwardly adversarial and arrogant. He had a script for human interaction.
- When asked a question, defer to "google it"
- If pushed for more information, fall back on "this is a graduate course, it's supposed to be hard"
- If pushed past this, claim superior knowledge of "we spent X hours on this, it's correct"
- If shown to be not correct, "If you think this is so easy, you volunteer"
- If presented with options, like putting some of this on git and look at pull requests, absolute silence.
I saw this pattern repeated many, many times. (Also, he was proud of mentioning how this is how it is in the real world. Let me tell you, Surly, I have at least 5 years on you, and no, it is not.)
The "us/them" mentality was manifested in other ways as well. One TA thought it absolutely hilarious to answer questions with "implement the function". Once in a while, for an obvious question, sure. But daily, for legitimate things people need help on that they've obviously tried to work out on their own, it's just offensive.
I get this position requires some volunteers to get paid to do, and that we as students can be entitled ****s, but the mindset of not helping got pretty deep later in the semester. Luckily we had some even-tempered and helpful STUDENTS doing much of the TA's work.
They need a LOT more training. They never "taught", and rarely "assisted".
The instructors were completely absent. If I remember correctly, Dr. Lee did one (maybe 2?) office hours.
denouement
This class is required (for OMSCyber, anyway), so there's little point in suggesting you don't take it. And, I did get something out of it.
But don't feel that you're going to get a lot of "information security" information out of it, unless you spend a lot more time in the book than is required. The stuff that tends to "stick" with you will be project based, and they were way too tricky for the sake of it and focused on too specific of a subject for a class like this.
Did I learn something? Sure, but mostly from the book (and arguably, projects 3 and 4).