ECE 419 - Security Laboratory

Semesters Offered

TitleRubricSectionCRNTypeTimesDaysLocationInstructor
Security LaboratoryCS460AD157998LAB0900 - 1020 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD250112LAB1030 - 1150 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD350113LAB1200 - 1330 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD457997LAB1330 - 1450 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD562653LAB1500 - 1620 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD662723LAB1630 - 1750 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AL157523LEC1800 - 1950 W  1404 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AL257524LEC1800 - 1950 W  1404 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD158000LAB0900 - 1020 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD250114LAB1030 - 1150 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD350115LAB1200 - 1330 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD457999LAB1330 - 1450 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD562654LAB1500 - 1620 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD662724LAB1630 - 1750 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AL157525LEC1800 - 1950 W  1404 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AL257526LEC1800 - 1950 W  1404 Siebel Center for Comp Sci John Bambenek

Official Description

Course Information: Same as CS 460. See CS 460.

Subject Area

Computer Engineering

Topics

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Detailed Description and Outline

Topics:

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Texts

M. Bishop, Introduction to Computer Security, Addison-Wesley, 2005.

Last updated

2/13/2013