This course examines the methods by which today's security protocols and their implementations are deemed secure and reliable. Students work to identify the mechanisms that make communications systems secure and consider how to assess the effectiveness of existing controls. The course takes a forward-looking approach and challenges students to consider problems such as the realization of quantum cryptography and the continued expansion of the Internet of Things (IoT). Students will examine and research methods for quantifying the level of protection provided by existing protocols, including formalized approaches to this type of assessment.