start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
start [2015/01/10 16:55] – mark | start [2015/01/10 16:57] (current) – mark | ||
---|---|---|---|
Line 6: | Line 6: | ||
This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | ||
- | Access Control - Identification, | + | Upon completion of the course the students should be able to: |
- | Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/ | + | |
- | + | * Write intrusion detection signatures | |
- | Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges | + | * Design and deploy security controls (e.g. firewalls, honeypot, |
- | + | * Discover vulnerability in computer systems | |
- | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | + | * Analyze and alter network traffic |
- | + | * Explain and identify different types of buffer overflow | |
- | Upon completion of the course the students should be able to: | + | * Design secure software applications |
- | + | ||
- | | + | |
- | application layer attacks | + | |
- | * Write intrusion detection signatures | + | |
- | * Design and deploy security controls (e.g. firewalls, honeypot, | + | |
- | password policy etc) | + | |
- | * Discover vulnerability in computer systems | + | |
- | * Analyze and alter network traffic | + | |
- | * Explain and identify different types of buffer overflow | + | |
- | * Design secure software applications | + | |
start.1420908951.txt.gz · Last modified: 2015/01/10 16:55 by mark