ECE 419

ECE 419 - Security Laboratory

Spring 2016

TitleRubricSectionCRNTypeHoursTimesDaysLocationInstructor
Security LaboratoryCS460AD157998LAB00900 - 1020 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD250112LAB01030 - 1150 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD350113LAB01200 - 1330 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD457997LAB01330 - 1450 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD562653LAB01500 - 1620 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AD662723LAB01630 - 1750 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryCS460AL157523LEC31530 - 1715 M  1320 Digital Computer Laboratory John Bambenek
Security LaboratoryCS460AL257524LEC41530 - 1715 M  1320 Digital Computer Laboratory John Bambenek
Security LaboratoryECE419AD158000LAB00900 - 1020 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD250114LAB01030 - 1150 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD350115LAB01200 - 1330 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD457999LAB01330 - 1450 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD562654LAB01500 - 1620 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AD662724LAB01630 - 1750 F  1129 Siebel Center for Comp Sci John Bambenek
Security LaboratoryECE419AL157525LEC31530 - 1715 M  1320 Digital Computer Laboratory John Bambenek
Security LaboratoryECE419AL257526LEC41530 - 1715 M  1320 Digital Computer Laboratory John Bambenek

Official Description

Course Information: Same as CS 460. See CS 460.

Subject Area

  • Computer Engineering

Topics

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Detailed Description and Outline

Topics:

  • Endpoint security overview
  • Windows and SELinux access control study
  • Windows and Linux Least Privilege and Delegation
  • Audit trail analysis
  • Network security overview
  • Firewalls
  • Network sniffing and attacks
  • VPN Configuration
  • Wireless security
  • IPv6 and mobile IP security
  • AAA interfaces
  • Intrusion detection
  • Worm and virus exploit studies
  • Security hardware, e.g. biometrics, smart cards, TPM
  • Forensics, e.g. honey pots
  • System security architecture case studies
  • Red teaming

Texts

M. Bishop, Introduction to Computer Security, Addison-Wesley, 2005.

Last updated

2/13/2013