start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| start [2010/09/08 19:27] – bil | start [2015/01/10 16:57] (current) – mark | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| ===== Description | ===== Description | ||
| - | The course | + | This course |
| + | |||
| + | Upon completion of the course the students should be able to: | ||
| + | |||
| + | * Explain popular operating systems, network, password-based, | ||
| + | * Write intrusion detection signatures | ||
| + | * Design and deploy security controls (e.g. firewalls, honeypot, | ||
| + | * Discover vulnerability in computer systems | ||
| + | * Analyze and alter network traffic | ||
| + | * Explain and identify different types of buffer overflow | ||
| + | * Design secure software applications | ||
| ===== Lectures ===== | ===== Lectures ===== | ||
| - | * Tuesdays and Thursdays, 17:30 - 19:00, CSEB 2007 | + | * Mondays |
| + | * Wednesdays | ||
| ===== Lab ===== | ===== Lab ===== | ||
| - | * Fridays, | + | * Fridays, |
start.1283974046.txt.gz · Last modified: by bil
