User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
start [2010/09/08 19:30] bilstart [2013/01/07 16:58] (current) mark
Line 6: Line 6:
 This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting.
  
-Access Control - Identification, authentication, and authorisation; trust management.+Access Control - Identification, authentication, and authorization.
  
-Network Security - attacks, intrusion detection, auditing and forensics, firewalls, malicious software, packet monitoring and other tools/techniques for finding network security related problems.+Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/techniques for finding network security related problems.
  
-Operating System Security - threats, vulnerability, and control, password management, accounts and privileges+Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges
  
-Application Software Security - design of secure systems, evaluation, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software and hardware, finding vulnerabilities, developing patches, patch distribution. +Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities.
- +
-Thinking Evil (understand the enemy so that you can design better software and systems) - how to build a virus, trojan, worm, (how to detect them and break them); real-world vulnerability detection.+
  
 ===== Lectures ===== ===== Lectures =====
  
-  * Tuesdays and Thursdays, 17:30 - 19:00, CSEB 2007+  * Mondays     17:30 - 19:00CSEB 1002 
 +  * Wednesdays  17:30 - 19:00, CSEB 1002
  
 ===== Lab ===== ===== Lab =====
  
-  * Fridays, 13:30 15:30, CSEB 2007+  * Fridays, 18:00 20:00, CSEB 1002
  
start.1283974215.txt.gz · Last modified: 2010/09/08 19:30 by bil

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki