Applied Security Breno de Medeiros Florida State University Spring 2007.

Slides:



Advertisements
Similar presentations
Computer Graphics and Animation (AT70.09) Comp. Sc. and Inf. Mgmt. Asian Institute of Technology.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Today’s Agenda  Syllabus CS2336: Computer Science II.
Introduction to CS170. CS170 has multiple sections Each section has its own class websites URLs for different sections: Section 000:
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
CS 331 / CMPE 334 – Intro to AI CS 531 / CMPE AI Course Outline.
Welcome to CS680! Tue Thu 7pm - 8:15pm :-(
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
Dr.-Ing. Erwin Sitompul President University Lecture 1 Introduction to Neural Networks and Fuzzy Logic President UniversityErwin SitompulNNFL 1/1
Winter 2008Logistics1 Advanced Computer Networks Prof. Venus W. Samawi Welcome to Time: 2pm –5pm Tuesday Winter credits.
CS 450: COMPUTER GRAPHICS COURSE AND SYLLABUS OVERVIEW SPRING 2015 DR. MICHAEL J. REALE.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Computer Network Fundamentals CNT4007C
Cpt S 471/571: Computational Genomics Spring 2015, 3 cr. Where: Sloan 9 When: M WF 11:10-12:00 Instructor weekly office hour for Spring 2015: Tuesdays.
G53SEC Computer Security Introduction to G53SEC 1.
Distributed Systems Dr. Almetwally Mohamad Mostafa
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Course Information. Course resources All course materials (slides, links to recorded lectures, online quiz, assignments, course project, and online exams)
CSCE 727 Information Warfare
Course Introduction Software Engineering
Applied Security Breno de Medeiros Florida State University Fall 2005.
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Data Structures (Second Part) Lecture 1 Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang University.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
GIS for Environmental Modeling GEO 479/559 Spring.
SEC835 Security in Databases and Web applications Presentation.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
CEN 137 Computer Literature and Skills INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. A. Turan Özcerit
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Networks CNT5106C
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
Course Overview CSE 8340 Advanced Software Engineering Topics: Software Engineering Economics & Processes Spring 2016 Dr. LiGuo Huang Dept. of Computer.
CIS 505: Programming- Language Paradigms Torben Amtoft Xinming (Simon) Ou Aug 23, 2010.
Course Outline Three Themes for the course: Theme 1: Starting a Research Design and setting it up Theme 2: in-depth lectures on the most common research.
CIS 4930/6930: Systems Security
Computer Network Fundamentals CNT4007C
CS431 Distributed Systems
Agenda Syllabus What is software testing ? Why it’s needed ?
Syllabus Introduction to Computer Science
ECE 533 Digital Image Processing
Introduction Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe.
CIS5930 Software Defined Networking
Computer Networks CNT5106C
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Mobile Ad hoc Networks (Spring 2003)
Computer Graphics and Animation (AT70. 09) Comp. Sc. and Inf. Mgmt
ISE 313 Computer Integrated Manufacturing and Automation
Course Overview CSE8313 Object-Oriented Analysis and Design
CSC/ECE 772: Survivable Networks
Information Systems Security Winter
Computer Networks CNT5106C
Introduction to Computers
Introduction to the course
ISA 562 Information Security Theory and Practice
Welcome to Software Engineering-2
Introduction to Computer Security II
CSE1311 Introductory Programming for Engineers & Scientists
Introduction to Neural Networks and Fuzzy Logic
CIS5930: Advanced Topics in Parallel and Distributed Systems
Computer Networks CNT5106C
MAT 379 Computer Networking
Folsom High School Class: AP Psychology Grade: 11th & 12th
Communication Systems – 2 Digital Communications
Course Overview CSE5319/7319 Software Architecture and Design
Folsom High School Class: Econ/AP Government
Introduction to computing and the Internet
AME Spring Lecture 11 - Thrust and aircraft range
Presentation transcript:

Applied Security Breno de Medeiros Florida State University Spring 2007

What is this course about? Learning how to 0wn the Internet for fun and profit. No, really: Learning how to make computer systems more secure in practice. (Labs + lecture) Source: printed materials/lab assignments/other Learning new trends in computer threats and appropriate countermeasures (Lecture + individual reading) Source: Assigned papers/other

Should I take this course? ZIf you have to. ZIf you find the subject appealing, and think that everything worth it takes work. ZDon’t take this course: ZIf this slide’s background is where you would like to spend a great deal of time this semester.

Course main references Textbook: None. Printed materials distributed in class. Reading assignments posted one week in advance. Recommended: Computer Security: Art & Science, by Matt Bishop, Addison- Wesley Internet Denial of Service, Attack and Defense Mechanisms, by Jelena Mirkovich et al. Prentice Hall. Inside Network Perimeter Security, by Stephen Northcutt et al. 2nd edition. Sans Institute Press.

Classroom Lectures Whenever no lab meeting announced Cover theory, (some) from notes, much from the assigned reading (research papers). Mid-term exam and final will cover this material.

Lab Meetings Announced in advance (in the website and during the prior lecture meeting) Covers some of the material in a practical setting Introduces the lab assignments. Lab assignments will be given regularly. Deliverables in the form of reports and/or code.

Project You are required to work on a project during this course. It must include: An element of originality. Implementing an existing application/service (without add-ons) is discouraged. A practical component (implementation or configuration of software, or system design). Literature review alone will not be sufficient.

Grading One Midterm: 10%; Final: 10% Lab assignments: 40%; Project: 40% Grade scale: A: ; A-: 89, 90. B: C: D: F:

Questions?