start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
start [2010/09/08 19:27] – bil | start [2015/01/10 16:57] (current) – mark | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
===== Description | ===== Description | ||
- | The course | + | This course |
+ | |||
+ | Upon completion of the course the students should be able to: | ||
+ | |||
+ | * Explain popular operating systems, network, password-based, | ||
+ | * Write intrusion detection signatures | ||
+ | * Design and deploy security controls (e.g. firewalls, honeypot, | ||
+ | * Discover vulnerability in computer systems | ||
+ | * Analyze and alter network traffic | ||
+ | * Explain and identify different types of buffer overflow | ||
+ | * Design secure software applications | ||
===== Lectures ===== | ===== Lectures ===== | ||
- | * Tuesdays and Thursdays, 17:30 - 19:00, CSEB 2007 | + | * Mondays |
+ | * Wednesdays | ||
===== Lab ===== | ===== Lab ===== | ||
- | * Fridays, | + | * Fridays, |
start.1283974046.txt.gz · Last modified: 2010/09/08 19:27 by bil