start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
start [2012/01/11 21:00] – mark | start [2015/01/10 16:57] (current) – mark | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
===== Description | ===== Description | ||
Line 6: | Line 6: | ||
This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | ||
- | Access Control - Identification, | + | Upon completion of the course the students should be able to: |
- | Network Security | + | * Explain popular operating systems, network, password-based, and application layer attacks |
+ | * Write intrusion detection | ||
+ | * Design and deploy security controls (e.g. firewalls, | ||
+ | * Discover vulnerability in computer systems | ||
+ | * Analyze | ||
+ | * Explain and identify different types of buffer overflow | ||
+ | * Design secure software applications | ||
- | Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges | ||
- | |||
- | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | ||
===== Lectures ===== | ===== Lectures ===== | ||
- | * Mondays | + | * Mondays |
* Wednesdays | * Wednesdays | ||
start.1326315622.txt.gz · Last modified: 2012/01/11 21:00 by mark