start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
start [2010/09/08 19:27] – bil | start [2010/09/10 14:49] (current) – bil | ||
---|---|---|---|
Line 4: | Line 4: | ||
===== Description | ===== Description | ||
- | The course | + | This course |
+ | |||
+ | Access Control - Identification, | ||
+ | |||
+ | Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring | ||
+ | |||
+ | Operating System Security - threats, vulnerability scanning, password cracking, accounts | ||
+ | |||
+ | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | ||
===== Lectures ===== | ===== Lectures ===== |
start.1283974046.txt.gz · Last modified: 2010/09/08 19:27 by bil