ECE 419
ECE 419 - Security Laboratory
Fall 2025
Title | Rubric | Section | CRN | Type | Hours | Times | Days | Location | Instructor |
---|---|---|---|---|---|---|---|---|---|
Security Laboratory | CS460 | ALG | 78444 | OLC | 4 | - | Casey O'Brien David M. Nicol | ||
Security Laboratory | CS460 | ALU | 78443 | OLC | 3 | - | Casey O'Brien David M. Nicol | ||
Security Laboratory | CS460 | LB1 | 78448 | LAB | 0 | 1700 - 1950 | W | 0218 Siebel Center for Comp Sci | Casey O'Brien David M. Nicol |
Security Laboratory | ECE419 | ALG | 80843 | OLC | 4 | - | Casey O'Brien David M. Nicol | ||
Security Laboratory | ECE419 | ALU | 80842 | OLC | 3 | - | Casey O'Brien David M. Nicol | ||
Security Laboratory | ECE419 | LB1 | 80844 | LAB | 0 | 1700 - 1950 | W | 0218 Siebel Center for Comp Sci | Casey O'Brien David M. Nicol |
See full schedule from Course Explorer
Official Description
Course Information: Same as CS 460. See CS 460.
Subject Area
- Computer Engineering
Topics
- Endpoint security overview
- Windows and SELinux access control study
- Windows and Linux Least Privilege and Delegation
- Audit trail analysis
- Network security overview
- Firewalls
- Network sniffing and attacks
- VPN Configuration
- Wireless security
- IPv6 and mobile IP security
- AAA interfaces
- Intrusion detection
- Worm and virus exploit studies
- Security hardware, e.g. biometrics, smart cards, TPM
- Forensics, e.g. honey pots
- System security architecture case studies
- Red teaming
Detailed Description and Outline
Topics:
- Endpoint security overview
- Windows and SELinux access control study
- Windows and Linux Least Privilege and Delegation
- Audit trail analysis
- Network security overview
- Firewalls
- Network sniffing and attacks
- VPN Configuration
- Wireless security
- IPv6 and mobile IP security
- AAA interfaces
- Intrusion detection
- Worm and virus exploit studies
- Security hardware, e.g. biometrics, smart cards, TPM
- Forensics, e.g. honey pots
- System security architecture case studies
- Red teaming
Texts
M. Bishop, Introduction to Computer Security, Addison-Wesley, 2005.
Last updated
2/13/2013