start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| start [2015/01/10 16:55] – mark | start [2015/01/10 16:57] (current) – mark | ||
|---|---|---|---|
| Line 6: | Line 6: | ||
| This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | ||
| - | Access Control - Identification, | + | Upon completion of the course the students should be able to: |
| - | Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/ | + | |
| - | + | * Write intrusion detection signatures | |
| - | Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges | + | * Design and deploy security controls (e.g. firewalls, honeypot, |
| - | + | * Discover vulnerability in computer systems | |
| - | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | + | * Analyze and alter network traffic |
| - | + | * Explain and identify different types of buffer overflow | |
| - | Upon completion of the course the students should be able to: | + | * Design secure software applications |
| - | + | ||
| - | | + | |
| - | application layer attacks | + | |
| - | * Write intrusion detection signatures | + | |
| - | * Design and deploy security controls (e.g. firewalls, honeypot, | + | |
| - | password policy etc) | + | |
| - | * Discover vulnerability in computer systems | + | |
| - | * Analyze and alter network traffic | + | |
| - | * Explain and identify different types of buffer overflow | + | |
| - | * Design secure software applications | + | |
start.1420908951.txt.gz · Last modified: by mark
