start
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| start [2007/08/14 15:36] – external edit 127.0.0.1 | start [2015/01/10 16:57] (current) – mark | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ~~NOTOC~~ | + | |
| - | ====== | + | ====== |
| ===== Description | ===== Description | ||
| - | The course | + | This course |
| + | |||
| + | Upon completion of the course the students should be able to: | ||
| + | |||
| + | * Explain popular operating systems, network, password-based, | ||
| + | * Write intrusion detection signatures | ||
| + | * Design and deploy security controls (e.g. firewalls, honeypot, | ||
| + | * Discover vulnerability in computer systems | ||
| + | * Analyze and alter network traffic | ||
| + | * Explain and identify different types of buffer overflow | ||
| + | * Design secure software applications | ||
| + | |||
| + | |||
| + | ===== Lectures ===== | ||
| + | |||
| + | * Mondays | ||
| + | * Wednesdays | ||
| - | ===== Lecture Times ===== | + | ===== Lab ===== |
| - | * Section A: Mondays and Fridays, | + | * Fridays, |
start.1187105762.txt.gz · Last modified: (external edit)
