User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
start [2015/01/10 16:55] markstart [2015/01/10 16:57] (current) mark
Line 6: Line 6:
 This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting.
  
-Access Control - Identification, authentication, and authorization.+Upon completion of the course the students should be able to:
  
-Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/techniques for finding network security related problems. +  * Explain popular operating systems, network, password-based, and application layer attacks 
- +  * Write intrusion detection signatures 
-Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges +  * Design and deploy security controls (e.g. firewalls, honeypot,password policy etc) 
- +  * Discover vulnerability in computer systems 
-Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. +  * Analyze and alter network traffic 
- +  * Explain and identify different types of buffer overflow 
- Upon completion of the course the students should be able to: +  * Design secure software applications
- +
-  * Explain popular operating systems, network, password-based, and +
- application layer attacks +
-  *  Write intrusion detection signatures +
-  *  Design and deploy security controls (e.g. firewalls, honeypot, +
- password policy etc) +
-  *  Discover vulnerability in computer systems +
-  *  Analyze and alter network traffic +
-  *  Explain and identify different types of buffer overflow +
-  *  Design secure software applications+
  
  
start.1420908951.txt.gz · Last modified: 2015/01/10 16:55 by mark

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki