User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
start [2015/01/10 16:56] markstart [2015/01/10 16:57] (current) mark
Line 6: Line 6:
 This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting.
  
-Access Control - Identification, authentication, and authorization. +Upon completion of the course the students should be able to:
- +
-Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/techniques for finding network security related problems. +
- +
-Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges +
- +
-Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. +
- +
- Upon completion of the course the students should be able to:+
  
   * Explain popular operating systems, network, password-based, and application layer attacks   * Explain popular operating systems, network, password-based, and application layer attacks
start.1420909009.txt.gz · Last modified: 2015/01/10 16:56 by mark

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki