ECE 419 - Security Laboratory

Semesters Offered

TitleRubricSectionCRNTypeHoursTimesDaysLocationInstructor
Security LaboratoryCS460AD157998LAB01300 - 1420 T  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AD250112LAB01500 - 1620 T  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AD350113LAB01300 - 1420 W  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AD457997LAB01500 - 1620 W  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AD562653LAB01300 - 1420 R  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AD662723LAB01500 - 1620 R  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AL157523LEC31300 - 1445 M  1404 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryCS460AL257524LEC41300 - 1445 M  1404 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD158000LAB01300 - 1420 T  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD250114LAB01500 - 1620 T  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD350115LAB01300 - 1420 W  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD457999LAB01500 - 1620 W  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD562654LAB01300 - 1420 R  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AD662724LAB01500 - 1620 R  1129 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AL157525LEC31300 - 1445 M  1404 Siebel Center for Comp Sci John Christian Bambenek
Security LaboratoryECE419AL257526LEC41300 - 1445 M  1404 Siebel Center for Comp Sci John Christian Bambenek

Official Description

Course Information: Same as CS 460. See CS 460.

Subject Area

Computer Engineering

Topics

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Detailed Description and Outline

Topics:

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Texts

M. Bishop, Introduction to Computer Security, Addison-Wesley, 2005.

Last updated

2/13/2013