Organizational Details Summer 2015
|
|
- Chastity Hunt
- 8 years ago
- Views:
Transcription
1 Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research
2 Cooperation for all security classes 183/1-ISecLab and 188/1 and SBA Research now jointly teach all classes.
3 Overview SUMMER Introduction to Security Seminar aus Security Software Security Internet Security Digital Forensics cancelled (contact: Winter Organizational Aspects of IT-Security Advanced Internet Security Privacy Enhancing Technologies
4 INTRODUCTION TO SECURITY
5 Overview TUWEL as central point of information Forum; only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl Daniela Friedl Course syllabus & Assignments: Dimitris Simos Georg Merzdovnik TAs: Kristoffer Kleine, Philipp Kafka, Wilfrid Mayer Lectures Lectures are condensed from the book attendance optional
6 Grading Grading 4 Assignments Submission via TUWEL Deadlines in TUWEL One-time-pad SQL-injection Cracking passwords Breaking WEP/WPA Exams (2 parts) Midterm Exam Final Exam Retake Exam: possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS! Room assignment for exams will be announced before exams
7 Details Dates Blocks & Book Chapters Lecturers March 12 Cryptography Block #1: 1, 2, 20 Dimitris Simos March 26 Cryptography Block #2: 21 Dimitris Simos April 16 Software Security Block: 5, 11, 12 Aljosha Judmayer April 23 Usable Security Block: 3, 17 Katharina Krombholz April 30 MIDTERM EXAM (4 p.m.) April 30 Malware Block: 6, 10 Georg Merzdovnik May 7 Network Security Block #1: 7, 8, 9 Johanna Ullrich May 21 Network Security Block #2: 22, 23, 24 Johanna Ullrich May 28 Management Issues of IT Security Block: 14,15,18,19 June 10 FINAL EXAM (2 p.m.) June 24 RETAKE EXAM (4 p.m.) Edgar Weippl
8 Required Literature Computer Security: Principles and Practice William Stallings, Lawrence Brown 3rd Edition Chapters: Midterm Exam : 1, 2, 3, 5, 11, 12, 17, 20, 21 Final Exam: 6, 7, 8, 9, 10, 14, 15, 18, 19, 22, 23, 24
9 Grading Scheme Total pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) pt 1 (Sehr gut)
10 SEMINAR AUS SECURITY
11 Overview TUWEL as central point of information Forum for questions Edgar Weippl Georg Merzdovnik Content: State-of-the-art security research Writing paper reviews, mini survey & presentation conference-style
12 Grading Grading 1 Survey paper of security relevant topics Group work of 2 2 Reviews of other students survey papers Final presentation Lectures Introduction lecture ,1pm, Seminarraum Gödel Two appointments for final presentation of surveys: 14:00-17: EI 9 Hlawka HS 14:00-17: EI 5 Hochenegg HS Attendance mandatory!
13 SOFTWARE SECURITY
14 Overview TUWEL as central point of information Forum; only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl Daniela Friedl Course syllabus & Assignments: Dimitris Simos Georg Merzdovnik Lecturers: Severin Winkler, Dimitris Simos, Sebastian Schrittwieser, Georg Merzdovnik, Manuel Leithner Tutor: Rene Czerny
15 Details Dates Lecture Blocks Lecturers March 13 OWASP Advanced Topics Severin Winkler April 13 Software Obfuscation Sebastian Schrittwieser April 17 Reverse Engineering Georg Merzdovnik April 24 MIDTERM EXAM (12 p.m.) May 8 Web Security Testing Dimitris Simos May 22 Language Security Manuel Leithner May 29 Java 8 Security & Secure Coding Severin Winkler June 11 Protocol Interaction Testing Dimitris Simos June 19 FINAL EXAM (13 p.m.)... June 26 RETAKE EXAM (12 p.m.) Exam Registration in TISS!
16 Grading Grading 3 Assignments Webapp Security Software Obfuscation (Reversing Basics - A Practical Approach Using IDA Pro) SSHd backdoor Exams (2 parts) Midterm Exam (24.4) Final Exam (19.6.) Retake Exam (26.6.): possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS!
17 Optional Literature Software Security: Building Security In Gary McGraw Midterm exam: OWASP advanced topics, software obfuscation, reverse engineering Final exam: web security testing, java 8 security & secure coding, language security, protocol interaction testing
18 Grading Scheme Total pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) pt 1 (Sehr gut)
19 Internet Security
20 Internet Security: Overview In cooperation with iseclab (e183) People: Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler; Tutor: Eduard Thamm, Willfried Mayer Lecture: FH HS6, Thursday Exam: June 25 th Final Grade: 50% Exam + 50% Lab Lab-Exercises: 5 Lab Challenges + 1 Bonus (5*20%+10% Bonus=110%) One challenge every apx 2 weeks No points for partially solved challenges! Need at least ½ of challenges & 50% on the exam to pass All details here:
21 Challenges (tentative list) Internet Security Network security tools (e.g., nmap, tcpdump) Web security (SQL injection, XSS ) Security-related programming assignment (java?) Cryptography Stack-based buffer overflow (advanced in comparison to other challenges)
22 Internet Security Lab Environment assignments should be mostly solved at home / any computer with Internet connection small hacking network, which is remotely accessible via ssh (Linux) Accounts are created automagically (registration until ) registered in TISS is used for correspondence Submission hard deadlines (with sufficient time) automated checks with immediate feedback Questions: USE TISS FORUM inetsec@seclab.tuwien.ac.at
23 InetSec 1 and InetSec 2 Internet Security InetSec 1 InetSec 2 Unix Security Windows Security Buffer Overflows Internet Application Security Cryptography Race Conditions ( ) Reverse Engineering Viruses and Worms Web Security Hardware Security
24 Your Roadmap to Enlightenment Requirement Rating InetSec 1, candidate InetSec 1, pass InetSec 2, 4 solved challenges InetSec 2, 5 solved challenges InetSec 2, 6 solved challenges InetSec 2, 6 solved challenges, CTF Nobody Apprentice Stackmaster expl0it Warlock Guru Master Guru
25 Who should do InetSec 2 Internet Security People who would like to become security gurus. We take part in a Capture the Flag hacking contest against other universities lots of fun. (1st place in 2011 and 2007, 2nd place in 2005, 2009, 2012, Defcon Finals in 2012). People who are hard-core technical (i.e., C and Linux should not be a problem for you) You should be interested in solving technical problems People who have time You get the chance to solve security challenges such as writing a virus, reverse engineering applications
26
27 Who should do InetSec 2 Internet Security Internet Security 2 (aka Advanced InetSec)
28 General information
29 Information Security Additionally we can offer: Praktikum (PR) Bachelor thesis Master thesis PhD thesis Research assistant Industrial projects Website:
30 COMET Research Center for Information Security SBA Research Area 1 (GRC): Governance, Risk and Compliance Area 2 (DSP): Data Security and Privacy Area 3 (SCA): Secure Coding and Code Analysis Area 4 (HNS): Hardware and Network Security P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet
31 International Cooperation
Advanced Internet Security
Advanced Internet Security (aka InetSec 2) 183.222 Lecturers Adrian Dabrowski Markus Kammerstetter Georg Merzdoznik Stefan Riegler Challenge Gurus Felix Winter Administrative Issues Mode Weekly lectures
More informationWelcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015
Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationUVic Department of Electrical and Computer Engineering
UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:
More informationSBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity
SBA Research Angewandte Forschung Angewandtes Wissen SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationWhen a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationEHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.
EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research
More informationCS 450/650 Fundamentals of Integrated Computer Security
CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E
More informationSoran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
More informationCSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu
More informationCourse Design Document. IS403: Advanced Information Security and Trust
Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...
More informationCSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834)
CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) C Sc 250 Computer Security and Privacy, Spring 2012 (TR 4-5:15p; RVR 2010) INSTRUCTOR: Martin Nicholes
More informationAdvanced Systems Security
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security
More informationNetwork Security ITP 457 (4 Units)
Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet
More informationPage: Designed & Executed By: Presents Cyber Security Training
Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic
More informationDepartment of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
More informationCS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Spring 2013 Course mechanics Instructor: Ian Goldberg https://cs.uwaterloo.ca/ iang/ Office hours: Thursdays
More informationCS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationPTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
More informationIntroduction to Programming
Introduction to Programming Summer Term 2016 Dr. Adrian Kacso, Univ. Siegen adriana.dkacsoa@duni-siegena.de Tel.: 0271/740-3966, Office: H-B 8406 / H-A 5109 State: April 11, 2016 Betriebssysteme / verteilte
More informationCS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
More informationYAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS
YAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS 2007 1 FOREWORD This guide has been prepared to provide information about rules and regulations of the Graduate
More informationMW 515-545, TU 1-3; and other times by appointment
CSUS, COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSC 154 - Computer System Attacks and Countermeasures/ C Sc 254 Network Security (MW 7-8:15p; RVR 1008), Fall 2013 Instructor:
More informationCertified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy
More informationCourse mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Fall 2008 Course mechanics Instructor: Ian Goldberg Contact info: http://www.cs.uwaterloo.ca/ iang/ Office
More informationCIS 4204 Ethical Hacking Fall, 2014
CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they
More informatione-code Academy Information Security Diploma Training Discerption
e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER
More information270123 - SI - Computer Security
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2014 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus
More informationComputer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden Motivation Course
More informationCNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan
CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu
More informationCourse Title: Course Description: Course Key Objective: Fee & Duration:
Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world.
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
More informationPSY 2012 General Psychology Syllabus
PSY 2012 General Psychology Syllabus Section 4398, Summer B 2013 Class meetings: When: 5 days a week: M, T, W, H, F during 4 th period (12:30 1:45pm) Where: New Engineering Bldg. (NEB) 101 (Across from
More informationMaster of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
More informationAdvanced Digital Forensics ITP 475 (4 Units)
Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming
More informationComputer Forensics introduction part A
Computer Forensics introduction part A Dr. Magdalena Szeżyńska, CISA Institute of Electronic Systems WUT m.szezynska@elka.pw.edu.pl Summer 2016 Digital Forensic Investigation Concepts A digital investigation
More informationUrsuline College Accelerated Program URSULINE COLLEGE
Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED
More informationComputer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
More informationINSTRUCTOR: Dwight Makaroff - Thorvaldson 281.3 x8656. Available via appointment.
Network and System Administration - CMPT 433 Syllabus University of Saskatchewan 2012-2013 Term 2 DESCRIPTION AND LEARNING OBJECTIVES ----------------------------------- CALENDAR DESCRIPTION: This course
More informationSecurity and Computer Forensics ITP 477 (4 Units)
Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,
More informationIntroduction to Computer Forensics Course Syllabus Spring 2012
Course Information Course Syllabus Spring 2012 Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: mjochen@esu.edu Office: 337 SCITECH Building Office Hours: Tues/Thurs 11 a.m. noon Weds 9 a.m. noon
More informationCIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
More informationLINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
More information[CEH]: Ethical Hacking and Countermeasures
[CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,
More informationCEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
More informationBachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.
Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming
More informationMKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)
INSTRUCTOR: Ta Tao Chuang, Ph.D. OFFICE and OFFICE HOURS: tba and by appointment EMAIL: chuang@jepson.gonzaga.edu BLACKBOARD: http://learn.gonzaga.edu DAYS, TIMES & ROOM: M, W 5:15 6:45 pm (15 weeks) IMPORTANT
More informationEECS 354 Network Security. Introduction
EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature
More informationPrepared by Seungwon Shawn Lee 1
GEORGE MASON UNIVERSITY TOUR 220 Introduction to Events Management Syllabus Summer 2010 Class time & Location: M/T/W/F 9:30 a.m. 11:45 a.m. Eng. Bldg. 1110 Credits: 3 Hours Professor: Seungwon Shawn Lee,
More informationComputer Security SEGC-00 - Overview
Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 1 / 14 Computer Security SEGC-00 - Overview Paulo Lício de Geus LASCA-IC-Unicamp Laboratory of Security and Cryptography Institute
More informationIntroduction to Information Technology ITP 101x (4 Units)
Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of
More informationModern Binary Exploitation Course Syllabus
Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationCSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu
CSCI 4250/6250 Fall 2015 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250! What is the purpose of this course?! Combined Undergrad/Graduate Intro to Computer
More informationDepartment of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015
Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015 Course General Information Course title GIS II Course number
More informationSpring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies
Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Instructor Chuan Yue Email cyue@uccs.edu Phone 719-255-5155 Course Day & Time Tuesday, Thursday
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationSONDRA SCHNEIDER JOHN NUNES
TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME
More informationTCOM 562 Network Security Fundamentals
TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class
More informationEC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationFORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
More informationCSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room
More informationTEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc.
CJ6600 CRIMINAL PROFILING SUMMER 2009 SYLLABUS (June 8, 2009 July 29 th, 2009) Instructor: Jack McGrath, Ph.D. Office: 1380 Lawrence Street Center Phone: (303) 960-4782 Email: John.McGrath@ucdenver.edu
More informationManagement 3050 Y Human Resource Management
Management 3050 Y Human Resource Management Summer 1 2013 Course Outline Saturdays / 9:00 11: 50 am & 1:00 3:50 PM / Room S4019 INSTRUCTOR OFFICE HOURS COURSE MATERIALS Required Textbook: Mali Mansouri
More informationSoftware Systems Engineering
Software Systems Engineering Introductory Meeting WS 2011/2012 Prof. Gerhard Lakemeyer, Ph.D. Dipl.-Inform. Stefan Schiffer, Patrick Selders RWTH Aachen University Knowledge-Based Systems Group (Lehr-
More informationPenetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
More informationCSC 314: Operating Systems Spring 2005
CSC 314: Operating Systems Spring 2005 Instructor: Lori Carter lcarter@ptloma.edu (619) 849-2352 Office hours: MWF TTh 11:00 a.m. 12:00 p.m. 1:15 2:15 p.m 10:00-11:30 a.m. Texts: Silbershatz et.al, Operating
More informationUNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF 325 - Theory of Finance SYLLABUS Spring 2013
UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF 325 - Theory of Finance SYLLABUS Spring 2013 Meeting time: Section 01 (1380) Mondays and Wednesdays, 4.00pm 5.15pm Room: McCormack 02-0404 Instructor:
More informationDepartment of Bioinformatics and Computational Biology College of Science Student Handbook
Department of Bioinformatics and Computational Biology College of Science Student Handbook Introduction This handbook describes policies and procedures for the Certificate, M.S., and Ph.D. Bioinformatics
More informationPOLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE
POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE Offices of the Dean of the College and the Dean of Students in the College COURSE REQUIREMENTS Students should
More informationIST553 Information Architecture for Internet Services
IST553 Information Architecture for Internet Services Syllabus Summer 2013 Instructor: Patrick W. Fitzgibbons, Ph.D. Telephone: 315-797-4062 e-mail: pwfitzgi@syr.edu Blackboard: Learning Management System:
More informationCS479/579 Special Topics: Social Computing Syllabus. Computer Science Department, New Mexico State University 01/20/2016 05/13/2016
1. Course Time & Venue CS479/579 Special Topics: Social Computing Syllabus Computer Science Department, New Mexico State University 01/20/2016 05/13/2016 Class: Tuesday, Thursday, 17:25 pm -18:40 p.m.,
More informationBUSA 501: Introduction to Business Analytics
BUSA 501: Introduction to Business Analytics COURSE SYLLABUS: Spring 2016 01W Instructor: Dr. Bo Han Email Address: bo.han@tamuc.edu To protect your academic privacy, please always send me emails from
More informationComputer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Sweden https://www.youtube.com/watch?v=kpyvenbpj5c
More informationTele3119 Trusted Networks Course Outline 2013
Tele3119 Trusted Networks Course Outline 2013 Staff Contact: A/Prof Robert Malaney, Email: r.malaney@unsw.edu.au Course Aim The main aim of this course is to develop a solid understanding of the key concepts
More informationISM 280-05 and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015
The University of North Carolina at Greensboro The Bryan School of Business and Economics Department of Information Systems and Supply Chain Management 1 Professor: Email: Office: Office hours: Phone:
More informationIntroduction to Computer Security
Introduction to Computer Security Course Introduction Pavel Laskov Wilhelm Schickard Institute for Computer Science Computer security in headlines Technische Universität B» Internet als Risikofaktor?»
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationMIS 416 01W: Mobile Business
MIS 416 01W: Mobile Business COURSE SYLLABUS: Spring 2015 Instructor: Dr. Bo Han Email Address: bo.han@tamuc.edu To protect your academic privacy, please always send me emails from your tamuc.edu email.
More informationKEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
More informationHigher National Unit specification: general information
Higher National Unit specification: general information Unit code: H17V 34 Superclass: CB Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is designed
More information2nd CYCLE MASTERS STUDY PROGRAMME IN COMPUTER AND INFORMATION SCIENCE
2nd CYCLE MASTERS STUDY PROGRAMME IN COMPUTER AND INFORMATION SCIENCE 1. General Information The2 nd cycle masters study of Computer and Information Science is a two-year programme (4 semesters) with a
More informationComputer and Network Security
EECS 588 Computer and Network Security Introduction January 12, 2016 Alex Halderman Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components
More informationECE 156A - Syllabus. Lecture 0 ECE 156A 1
ECE 156A - Syllabus Lecture 0 ECE 156A 1 Description Introduction to HDL basic elements, HDL simulation concepts, HDL concurrent statements with examples and applications, writing HDL for synthesis, and
More informationWhy Security Matters. Why Security Matters. 00 Overview 03 Sept 2015. CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1
CSCD27 Computer and Network Security Instructor: Alan Rosselet Office: IC-494 E-mail: rosselet @ utsc utoronto ca Web: http://www.utsc.utoronto.ca/~rosselet/cscd27/ 00 Overview CSCD27 Computer and Network
More informationHow To Prepare And Manage A Project
University of Split Department of Professional Studies PREPARATION AND PROJECT MANAGEMENT COURSE SYLLABUS 1 COURSE DETAILS Type of study programme Study programme Course title Course code ECTS (Number
More informationDEPARTMENT OF INFORMATION SCIENCE. INFO221 Application Software Development COURSE OUTLINE
DEPARTMENT OF INFORMATION SCIENCE INFO221 Application Software Development COURSE OUTLINE Semester Two, 2014 Paper Description and Aims This course involves a study of the principles and practise of Application
More information(Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science
(Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science In this masters program, a focus on one of these areas will be selected by the student Modules
More informationEarth System Science. Curriculum. Master of Science
Contact University of Hohenheim Study Counselling Prof. Dr. Volker Wulfmeyer Dr. Andreas Behrendt 70593 Stuttgart Germany Phone +49 (0)711 459-22313 counselling-ess@uni-hohenheim.de www.uni-hohenheim.de/ess
More informationAdvanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
More informationJune 2014 WMLUG Meeting Kali Linux
June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed
More informationCIS 213 PENETRATION TESTING 3 cr. (2-2)
JOHN A. LOGAN COLLEGE M. Rogers SP 15 CIS 213 PENETRATION TESTING 3 cr. (2-2) COURSE DESCRIPTION: This course teaches students the underlying principles and many of the techniques associated with the cybersecurity
More informationSyracuse University School of Information Studies. IST553 - Information Architecture for Internet Services. Tentative Syllabus - Spring 2015
Syracuse University School of Information Studies IST553 - Information Architecture for Internet Services Tentative Syllabus - Spring 2015 Instructor: Patrick W. Fitzgibbons, Ph.D. e-mail: pwfitzgi@syr.edu
More information