User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
start [2010/09/08 19:30] bilstart [2010/09/10 14:49] (current) bil
Line 6: Line 6:
 This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting.
  
-Access Control - Identification, authentication, and authorisation; trust management.+Access Control - Identification, authentication, and authorization.
  
-Network Security - attacks, intrusion detection, auditing and forensics, firewalls, malicious software, packet monitoring and other tools/techniques for finding network security related problems.+Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/techniques for finding network security related problems.
  
-Operating System Security - threats, vulnerability, and control, password management, accounts and privileges+Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges
  
-Application Software Security - design of secure systems, evaluation, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software and hardware, finding vulnerabilities, developing patches, patch distribution. +Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities.
- +
-Thinking Evil (understand the enemy so that you can design better software and systems) - how to build a virus, trojan, worm, (how to detect them and break them); real-world vulnerability detection.+
  
 ===== Lectures ===== ===== Lectures =====
start.1283974215.txt.gz · Last modified: 2010/09/08 19:30 by bil

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki