Maj Jeremy R. Millar, Adjunct Assistant Professor in Computer Science

Teaching Timeline

Bellevue University – CYBR 650 – Current Trends in Cybersecurity; Summer 2019, Winter 2019, Summer 2020 (2 sections), Winter 2020, Spring 2021, Summer 2021, Fall 2021; Instructor of record

This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments.

Bellevue University – CYBR 525 – Ethical Hacking and Response; Winter 2019; Instructor of record

This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.

Bellevue University – CYBR 450 – Advanced Cybersecurity Concepts; Winter 2019 (2 sections); Instructor of record

This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.

Bellevue University – CYBR 430 – Penetration Testing and Incident Response; Summer 2019; Instructor of record

This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures.

Bellevue University – CYBR 515 – Security Architecture and Design; Spring 2019; Instructor of record

This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.

Air Force Institute of Technology – CSCE 586 – Design and Analysis of Algorithms; Fall 2017; Instructor of record

This course emphasizes the structure of data and the efficient and effective manipulation of such structures. Physical and logical organization of data is discussed along with data and algorithm abstraction using object-oriented design and abstract data types. Detailed procedures are developed for analyzing the time and space complexities of general algorithms as well as an introduction to NP completeness. Specific data structures discussed include generalized lists, trees, graphs, B-trees, and AVL-trees along with indexing, hashing, sorting, searching and recursive algorithms on specific structures. Well founded algorithm uses like divide-and-conquer, local searching, and global searching are also introduced. Course projects emphasize the analysis, reuse, and extension of existing designs and implementations.

Air Force Institute of Technology – CSCE 689 – Distributed Software Systems; Winter 2018; Instructor of record

The objective of the course is to extend the fundamentals of computer operating systems (OS) into distributed systems and to map those concepts to the implementation of actual systems. Topics extending OS include distributed operating systems, multiprocessor operating systems, distributed file systems, distributed scheduling (including deadlock issues), fault tolerance, distributed transaction processing, and client server systems. Topics focused on large scale distributed systems include cloud computing/security and virtualization.

Air Force Institute of Technology – CSCE 544 – Data Security; Spring 2018; Co-instructor

This course presents the rudiments of data security. The emphasis is on cryptography, beginning with simple ciphers, and extending to public key cryptography based on sophisticated number-theoretic considerations. Other topics include keymanagement, access controls and inference controls.

Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565