This course introduces students to the threats as well as defenses for securing networks. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. Topics covered include network security, authentication, security protocol design and analysis, security modeling, trusted computing, key management, program safety, intrusion detection, DDoS detection and mitigation, architecture/operating systems security, security policy, web security, and other emerging topics.
Professors |
|
|||||||||||||||
Teaching Assistants |
|
|||||||||||||||
Lectures | TTh 11:00AM-12:15PM | |||||||||||||||
Format | This class will be 100% online, with both synchronous and asynchronous lectures. | |||||||||||||||
Required Text Book |
There is NO specific textbook for this course. The following books can be used as a supplement: (i) Introduction to Computer Security by Goodrich and Tamassia (ii) Computer Security: Principles and Practice, 2nd. Ed., by William Stalling and Lawrence Brown |
|||||||||||||||
Communications |
We will make use of the following communication methods during this course: |
|||||||||||||||
Grading |
We will calculate your course grade based on these components:
|
|||||||||||||||
Schedule | Click here. |
The expectations for the course are that students will attend every class, do any readings assigned for class, and actively and constructively participate in class discussions. Class participation will be a measure of contributing to the discourse both in class, through discussion and questions, and outside of class through contributing and responding to the discussion forum. More information about course requirements will be made available leading up to the start of classes
This course includes topics related to computer security and privacy. As part of this investigation, we may cover technologies whose abuse could infringe on the rights of others. As computer scientists, we rely on the ethical use of these technologies. Unethical use includes circumvention of an existing security or privacy mechanisms for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and possibly more severe academic and legal sanctions.
This course is based on NEU's CS 4740/6740 Network Security course, taught by Professor Christo Wilson.