Introduction to Computer Security

(3-0-3-4)

CMPE Degree: This course is Selected Elective for the CMPE degree.

EE Degree: This course is Selected Elective for the EE degree.

Lab Hours: 0 supervised lab hours and 3 unsupervised lab hours.

Technical Interest Groups / Course Categories: Threads / ECE Electives

Course Coordinator: Angelos D Keromytis

Prerequisites: ECE3600 [min D] or ECE 4110 [min D] or CS3251 [min D]

Catalog Description

Introductory topics in computer security are presented with an emphasis on fundamental security primitives and current security challenges facing society.

Course Outcomes

Describe why system and networks are vulnerable to attacks

Describe various methods for defending and detecting system and network attacks

Describe the practical challenges with implementing and defending against system and network attacks, 

Utilize hardware- and software-based networking and system analysis to assess the risk to systems and the benefits of specific defensive techniques

Strategic Performance Indicators (SPIs)

N/A

Topic List

  1. Ethical Hacking
  2. Introduction and Overview
  3. Fundamental Concepts
  4. Network Security Concepts
  5. Attacks at Multiple Layers and Countermeasures
  6. Denial-of-Service Attacks
  7. Firewalls
  8. Intrusion Detection
  9. Wireless Networking Concepts, Attacks, and Countermeasures
  10. Network Security Concepts
  11. Attacks at Multiple Layers and Countermeasures
  12. Denial-of-Service Attacks
  13. Firewalls
  14. Intrusion Detection
  15. Wireless Networking Concepts, Attacks, and Countermeasures
  16. Network Security Concepts
  17. Attacks at Multiple Layers and Countermeasures
  18. Denial-of-Service Attacks
  19. Firewalls
  20. Intrusion Detection
  21. Wireless Networking Concepts, Attacks, and Countermeasures
  22. Operating Systems Concepts Overview
  23. Process Security
  24. Memory and Filesystem Security
  25. Application Program Security
  26. Operating Systems Concepts Overview
  27. Process Security
  28. Memory and Filesystem Security
  29. Application Program Security
  30. Insider Attacks
  31. Computer Viruses
  32. Malware Attacks
  33. Privacy-Invasive Software
  34. Countermeasures
  35. Insider Attacks
  36. Computer Viruses
  37. Malware Attacks
  38. Privacy-Invasive Software
  39. Countermeasures
  40. The World Wide Web Overview
  41. Attacks on Clients
  42. Attacks on Servers
  43. Symmetric Cryptography
  44. Public-Key Cryptography
  45. Cryptographic Hash Functions
  46. Digital Signatures
  47. Symmetric Cryptography
  48. Public-Key Cryptography
  49. Cryptographic Hash Functions
  50. Digital Signatures
  51. Kerberos
  52. Social Networking Security