start
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
start [2007/08/14 15:36] – external edit 127.0.0.1 | start [2015/01/10 16:57] (current) – mark | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ~~NOTOC~~ | + | |
- | ====== | + | ====== |
===== Description | ===== Description | ||
- | The course | + | This course |
+ | |||
+ | Upon completion of the course the students should be able to: | ||
+ | |||
+ | * Explain popular operating systems, network, password-based, | ||
+ | * Write intrusion detection signatures | ||
+ | * Design and deploy security controls (e.g. firewalls, honeypot, | ||
+ | * Discover vulnerability in computer systems | ||
+ | * Analyze and alter network traffic | ||
+ | * Explain and identify different types of buffer overflow | ||
+ | * Design secure software applications | ||
+ | |||
+ | |||
+ | ===== Lectures ===== | ||
+ | |||
+ | * Mondays | ||
+ | * Wednesdays | ||
- | ===== Lecture Times ===== | + | ===== Lab ===== |
- | * Section A: Mondays and Fridays, | + | * Fridays, |
start.1187105762.txt.gz · Last modified: 2010/09/08 19:27 (external edit)