Introduction to Computer Security
(3-0-3-4)
CMPE Degree: This course is Selected Elective for the CMPE degree.
EE Degree: This course is Selected Elective for the EE degree.
Lab Hours: 0 supervised lab hours and 3 unsupervised lab hours.
Technical Interest Groups / Course Categories: Threads / ECE Electives
Course Coordinator: Angelos D Keromytis
Prerequisites: ECE3600 [min D] or ECE 4110 [min D] or CS3251 [min D]
Catalog Description
Introductory topics in computer security are presented with an emphasis on fundamental security primitives and current security challenges facing society.Course Outcomes
Describe why system and networks are vulnerable to attacks
Describe various methods for defending and detecting system and network attacks
Describe the practical challenges with implementing and defending against system and network attacks,
Utilize hardware- and software-based networking and system analysis to assess the risk to systems and the benefits of specific defensive techniques
Strategic Performance Indicators (SPIs)
N/A
Topic List
- Ethical Hacking
- Introduction and Overview
- Fundamental Concepts
- Network Security Concepts
- Attacks at Multiple Layers and Countermeasures
- Denial-of-Service Attacks
- Firewalls
- Intrusion Detection
- Wireless Networking Concepts, Attacks, and Countermeasures
- Network Security Concepts
- Attacks at Multiple Layers and Countermeasures
- Denial-of-Service Attacks
- Firewalls
- Intrusion Detection
- Wireless Networking Concepts, Attacks, and Countermeasures
- Network Security Concepts
- Attacks at Multiple Layers and Countermeasures
- Denial-of-Service Attacks
- Firewalls
- Intrusion Detection
- Wireless Networking Concepts, Attacks, and Countermeasures
- Operating Systems Concepts Overview
- Process Security
- Memory and Filesystem Security
- Application Program Security
- Operating Systems Concepts Overview
- Process Security
- Memory and Filesystem Security
- Application Program Security
- Insider Attacks
- Computer Viruses
- Malware Attacks
- Privacy-Invasive Software
- Countermeasures
- Insider Attacks
- Computer Viruses
- Malware Attacks
- Privacy-Invasive Software
- Countermeasures
- The World Wide Web Overview
- Attacks on Clients
- Attacks on Servers
- Symmetric Cryptography
- Public-Key Cryptography
- Cryptographic Hash Functions
- Digital Signatures
- Symmetric Cryptography
- Public-Key Cryptography
- Cryptographic Hash Functions
- Digital Signatures
- Kerberos
- Social Networking Security