start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
start [2015/01/10 16:56] – mark | start [2015/01/10 16:57] (current) – mark | ||
---|---|---|---|
Line 6: | Line 6: | ||
This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | This course provides a thorough understanding of the technical aspects of computer security. It covers network, operating system, and application software security. Computer laboratory projects provide exposure to various tools in a hands-on setting. | ||
- | Access Control - Identification, | + | Upon completion of the course the students should be able to: |
- | + | ||
- | Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring and other tools/ | + | |
- | + | ||
- | Operating System Security - threats, vulnerability scanning, password cracking, accounts and privileges | + | |
- | + | ||
- | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | + | |
- | + | ||
- | Upon completion of the course the students should be able to: | + | |
* Explain popular operating systems, network, password-based, | * Explain popular operating systems, network, password-based, |
start.1420909009.txt.gz · Last modified: 2015/01/10 16:56 by mark