George Mason University ยท School of Computing
Course Overview
IT 366 introduces the fundamental concepts and techniques behind securing networked systems. Students gain both theoretical understanding and hands-on familiarity with the cryptographic tools that underpin modern cybersecurity โ from symmetric encryption to public-key infrastructure and digital signatures.
The course is built around the premise that you cannot defend what you do not understand. Before students can secure a network, they must understand how attackers think, how cryptographic primitives work, and how the classic triad of security services โ confidentiality, integrity, and availability โ applies to every design decision.
The CIA Triad โ Core Security Services
Cryptographic Building Blocks
Instructor Note
My background in cryptography dates to my years as an application developer and architect at IBM, where I worked directly on cryptographic systems. I later applied that foundation across two decades of cybersecurity leadership โ at the Federal Government, and as CIO/CISO at Northwest Federal Credit Union. In IT 366, students get exposure to the same concepts I've used throughout my career to protect some of the most sensitive systems in the country.