Organizational Details Summer 2015

Size: px
Start display at page:

Download "Organizational Details Summer 2015"

Transcription

1 Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research

2 Cooperation for all security classes 183/1-ISecLab and 188/1 and SBA Research now jointly teach all classes.

3 Overview SUMMER Introduction to Security Seminar aus Security Software Security Internet Security Digital Forensics cancelled (contact: Winter Organizational Aspects of IT-Security Advanced Internet Security Privacy Enhancing Technologies

4 INTRODUCTION TO SECURITY

5 Overview TUWEL as central point of information Forum; only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl Daniela Friedl Course syllabus & Assignments: Dimitris Simos Georg Merzdovnik TAs: Kristoffer Kleine, Philipp Kafka, Wilfrid Mayer Lectures Lectures are condensed from the book attendance optional

6 Grading Grading 4 Assignments Submission via TUWEL Deadlines in TUWEL One-time-pad SQL-injection Cracking passwords Breaking WEP/WPA Exams (2 parts) Midterm Exam Final Exam Retake Exam: possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS! Room assignment for exams will be announced before exams

7 Details Dates Blocks & Book Chapters Lecturers March 12 Cryptography Block #1: 1, 2, 20 Dimitris Simos March 26 Cryptography Block #2: 21 Dimitris Simos April 16 Software Security Block: 5, 11, 12 Aljosha Judmayer April 23 Usable Security Block: 3, 17 Katharina Krombholz April 30 MIDTERM EXAM (4 p.m.) April 30 Malware Block: 6, 10 Georg Merzdovnik May 7 Network Security Block #1: 7, 8, 9 Johanna Ullrich May 21 Network Security Block #2: 22, 23, 24 Johanna Ullrich May 28 Management Issues of IT Security Block: 14,15,18,19 June 10 FINAL EXAM (2 p.m.) June 24 RETAKE EXAM (4 p.m.) Edgar Weippl

8 Required Literature Computer Security: Principles and Practice William Stallings, Lawrence Brown 3rd Edition Chapters: Midterm Exam : 1, 2, 3, 5, 11, 12, 17, 20, 21 Final Exam: 6, 7, 8, 9, 10, 14, 15, 18, 19, 22, 23, 24

9 Grading Scheme Total pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) pt 1 (Sehr gut)

10 SEMINAR AUS SECURITY

11 Overview TUWEL as central point of information Forum for questions Edgar Weippl Georg Merzdovnik Content: State-of-the-art security research Writing paper reviews, mini survey & presentation conference-style

12 Grading Grading 1 Survey paper of security relevant topics Group work of 2 2 Reviews of other students survey papers Final presentation Lectures Introduction lecture ,1pm, Seminarraum Gödel Two appointments for final presentation of surveys: 14:00-17: EI 9 Hlawka HS 14:00-17: EI 5 Hochenegg HS Attendance mandatory!

13 SOFTWARE SECURITY

14 Overview TUWEL as central point of information Forum; only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl Daniela Friedl Course syllabus & Assignments: Dimitris Simos Georg Merzdovnik Lecturers: Severin Winkler, Dimitris Simos, Sebastian Schrittwieser, Georg Merzdovnik, Manuel Leithner Tutor: Rene Czerny

15 Details Dates Lecture Blocks Lecturers March 13 OWASP Advanced Topics Severin Winkler April 13 Software Obfuscation Sebastian Schrittwieser April 17 Reverse Engineering Georg Merzdovnik April 24 MIDTERM EXAM (12 p.m.) May 8 Web Security Testing Dimitris Simos May 22 Language Security Manuel Leithner May 29 Java 8 Security & Secure Coding Severin Winkler June 11 Protocol Interaction Testing Dimitris Simos June 19 FINAL EXAM (13 p.m.)... June 26 RETAKE EXAM (12 p.m.) Exam Registration in TISS!

16 Grading Grading 3 Assignments Webapp Security Software Obfuscation (Reversing Basics - A Practical Approach Using IDA Pro) SSHd backdoor Exams (2 parts) Midterm Exam (24.4) Final Exam (19.6.) Retake Exam (26.6.): possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS!

17 Optional Literature Software Security: Building Security In Gary McGraw Midterm exam: OWASP advanced topics, software obfuscation, reverse engineering Final exam: web security testing, java 8 security & secure coding, language security, protocol interaction testing

18 Grading Scheme Total pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) pt 1 (Sehr gut)

19 Internet Security

20 Internet Security: Overview In cooperation with iseclab (e183) People: Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler; Tutor: Eduard Thamm, Willfried Mayer Lecture: FH HS6, Thursday Exam: June 25 th Final Grade: 50% Exam + 50% Lab Lab-Exercises: 5 Lab Challenges + 1 Bonus (5*20%+10% Bonus=110%) One challenge every apx 2 weeks No points for partially solved challenges! Need at least ½ of challenges & 50% on the exam to pass All details here:

21 Challenges (tentative list) Internet Security Network security tools (e.g., nmap, tcpdump) Web security (SQL injection, XSS ) Security-related programming assignment (java?) Cryptography Stack-based buffer overflow (advanced in comparison to other challenges)

22 Internet Security Lab Environment assignments should be mostly solved at home / any computer with Internet connection small hacking network, which is remotely accessible via ssh (Linux) Accounts are created automagically (registration until ) registered in TISS is used for correspondence Submission hard deadlines (with sufficient time) automated checks with immediate feedback Questions: USE TISS FORUM inetsec@seclab.tuwien.ac.at

23 InetSec 1 and InetSec 2 Internet Security InetSec 1 InetSec 2 Unix Security Windows Security Buffer Overflows Internet Application Security Cryptography Race Conditions ( ) Reverse Engineering Viruses and Worms Web Security Hardware Security

24 Your Roadmap to Enlightenment Requirement Rating InetSec 1, candidate InetSec 1, pass InetSec 2, 4 solved challenges InetSec 2, 5 solved challenges InetSec 2, 6 solved challenges InetSec 2, 6 solved challenges, CTF Nobody Apprentice Stackmaster expl0it Warlock Guru Master Guru

25 Who should do InetSec 2 Internet Security People who would like to become security gurus. We take part in a Capture the Flag hacking contest against other universities lots of fun. (1st place in 2011 and 2007, 2nd place in 2005, 2009, 2012, Defcon Finals in 2012). People who are hard-core technical (i.e., C and Linux should not be a problem for you) You should be interested in solving technical problems People who have time You get the chance to solve security challenges such as writing a virus, reverse engineering applications

26

27 Who should do InetSec 2 Internet Security Internet Security 2 (aka Advanced InetSec)

28 General information

29 Information Security Additionally we can offer: Praktikum (PR) Bachelor thesis Master thesis PhD thesis Research assistant Industrial projects Website:

30 COMET Research Center for Information Security SBA Research Area 1 (GRC): Governance, Risk and Compliance Area 2 (DSP): Data Security and Privacy Area 3 (SCA): Secure Coding and Code Analysis Area 4 (HNS): Hardware and Network Security P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet

31 International Cooperation

Advanced Internet Security

Advanced Internet Security Advanced Internet Security (aka InetSec 2) 183.222 Lecturers Adrian Dabrowski Markus Kammerstetter Georg Merzdoznik Stefan Riegler Challenge Gurus Felix Winter Administrative Issues Mode Weekly lectures

More information

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity

SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity SBA Research Angewandte Forschung Angewandtes Wissen SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R. EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research

More information

CS 450/650 Fundamentals of Integrated Computer Security

CS 450/650 Fundamentals of Integrated Computer Security CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834)

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) C Sc 250 Computer Security and Privacy, Spring 2012 (TR 4-5:15p; RVR 2010) INSTRUCTOR: Martin Nicholes

More information

Advanced Systems Security

Advanced Systems Security Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security

More information

Network Security ITP 457 (4 Units)

Network Security ITP 457 (4 Units) Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

More information

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy. CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Spring 2013 Course mechanics Instructor: Ian Goldberg https://cs.uwaterloo.ca/ iang/ Office hours: Thursdays

More information

CS 391-950 Ethical Hacking Spring 2016

CS 391-950 Ethical Hacking Spring 2016 CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

Introduction to Programming

Introduction to Programming Introduction to Programming Summer Term 2016 Dr. Adrian Kacso, Univ. Siegen adriana.dkacsoa@duni-siegena.de Tel.: 0271/740-3966, Office: H-B 8406 / H-A 5109 State: April 11, 2016 Betriebssysteme / verteilte

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

YAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS

YAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS YAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS 2007 1 FOREWORD This guide has been prepared to provide information about rules and regulations of the Graduate

More information

MW 515-545, TU 1-3; and other times by appointment

MW 515-545, TU 1-3; and other times by appointment CSUS, COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSC 154 - Computer System Attacks and Countermeasures/ C Sc 254 Network Security (MW 7-8:15p; RVR 1008), Fall 2013 Instructor:

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

More information

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Fall 2008 Course mechanics Instructor: Ian Goldberg Contact info: http://www.cs.uwaterloo.ca/ iang/ Office

More information

CIS 4204 Ethical Hacking Fall, 2014

CIS 4204 Ethical Hacking Fall, 2014 CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

270123 - SI - Computer Security

270123 - SI - Computer Security Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2014 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden Motivation Course

More information

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu

More information

Course Title: Course Description: Course Key Objective: Fee & Duration:

Course Title: Course Description: Course Key Objective: Fee & Duration: Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world.

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

PSY 2012 General Psychology Syllabus

PSY 2012 General Psychology Syllabus PSY 2012 General Psychology Syllabus Section 4398, Summer B 2013 Class meetings: When: 5 days a week: M, T, W, H, F during 4 th period (12:30 1:45pm) Where: New Engineering Bldg. (NEB) 101 (Across from

More information

Master of Science in Information Systems & Security Management. Courses Descriptions

Master of Science in Information Systems & Security Management. Courses Descriptions Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

Computer Forensics introduction part A

Computer Forensics introduction part A Computer Forensics introduction part A Dr. Magdalena Szeżyńska, CISA Institute of Electronic Systems WUT m.szezynska@elka.pw.edu.pl Summer 2016 Digital Forensic Investigation Concepts A digital investigation

More information

Ursuline College Accelerated Program URSULINE COLLEGE

Ursuline College Accelerated Program URSULINE COLLEGE Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

INSTRUCTOR: Dwight Makaroff - Thorvaldson 281.3 x8656. Available via appointment.

INSTRUCTOR: Dwight Makaroff - Thorvaldson 281.3 x8656. Available via appointment. Network and System Administration - CMPT 433 Syllabus University of Saskatchewan 2012-2013 Term 2 DESCRIPTION AND LEARNING OBJECTIVES ----------------------------------- CALENDAR DESCRIPTION: This course

More information

Security and Computer Forensics ITP 477 (4 Units)

Security and Computer Forensics ITP 477 (4 Units) Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,

More information

Introduction to Computer Forensics Course Syllabus Spring 2012

Introduction to Computer Forensics Course Syllabus Spring 2012 Course Information Course Syllabus Spring 2012 Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: mjochen@esu.edu Office: 337 SCITECH Building Office Hours: Tues/Thurs 11 a.m. noon Weds 9 a.m. noon

More information

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2. Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming

More information

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative) INSTRUCTOR: Ta Tao Chuang, Ph.D. OFFICE and OFFICE HOURS: tba and by appointment EMAIL: chuang@jepson.gonzaga.edu BLACKBOARD: http://learn.gonzaga.edu DAYS, TIMES & ROOM: M, W 5:15 6:45 pm (15 weeks) IMPORTANT

More information

EECS 354 Network Security. Introduction

EECS 354 Network Security. Introduction EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature

More information

Prepared by Seungwon Shawn Lee 1

Prepared by Seungwon Shawn Lee 1 GEORGE MASON UNIVERSITY TOUR 220 Introduction to Events Management Syllabus Summer 2010 Class time & Location: M/T/W/F 9:30 a.m. 11:45 a.m. Eng. Bldg. 1110 Credits: 3 Hours Professor: Seungwon Shawn Lee,

More information

Computer Security SEGC-00 - Overview

Computer Security SEGC-00 - Overview Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 1 / 14 Computer Security SEGC-00 - Overview Paulo Lício de Geus LASCA-IC-Unicamp Laboratory of Security and Cryptography Institute

More information

Introduction to Information Technology ITP 101x (4 Units)

Introduction to Information Technology ITP 101x (4 Units) Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of

More information

Modern Binary Exploitation Course Syllabus

Modern Binary Exploitation Course Syllabus Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 Fall 2015 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250! What is the purpose of this course?! Combined Undergrad/Graduate Intro to Computer

More information

Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015

Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015 Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015 Course General Information Course title GIS II Course number

More information

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Instructor Chuan Yue Email cyue@uccs.edu Phone 719-255-5155 Course Day & Time Tuesday, Thursday

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

TCOM 562 Network Security Fundamentals

TCOM 562 Network Security Fundamentals TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room

More information

TEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc.

TEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc. CJ6600 CRIMINAL PROFILING SUMMER 2009 SYLLABUS (June 8, 2009 July 29 th, 2009) Instructor: Jack McGrath, Ph.D. Office: 1380 Lawrence Street Center Phone: (303) 960-4782 Email: John.McGrath@ucdenver.edu

More information

Management 3050 Y Human Resource Management

Management 3050 Y Human Resource Management Management 3050 Y Human Resource Management Summer 1 2013 Course Outline Saturdays / 9:00 11: 50 am & 1:00 3:50 PM / Room S4019 INSTRUCTOR OFFICE HOURS COURSE MATERIALS Required Textbook: Mali Mansouri

More information

Software Systems Engineering

Software Systems Engineering Software Systems Engineering Introductory Meeting WS 2011/2012 Prof. Gerhard Lakemeyer, Ph.D. Dipl.-Inform. Stefan Schiffer, Patrick Selders RWTH Aachen University Knowledge-Based Systems Group (Lehr-

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

CSC 314: Operating Systems Spring 2005

CSC 314: Operating Systems Spring 2005 CSC 314: Operating Systems Spring 2005 Instructor: Lori Carter lcarter@ptloma.edu (619) 849-2352 Office hours: MWF TTh 11:00 a.m. 12:00 p.m. 1:15 2:15 p.m 10:00-11:30 a.m. Texts: Silbershatz et.al, Operating

More information

UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF 325 - Theory of Finance SYLLABUS Spring 2013

UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF 325 - Theory of Finance SYLLABUS Spring 2013 UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF 325 - Theory of Finance SYLLABUS Spring 2013 Meeting time: Section 01 (1380) Mondays and Wednesdays, 4.00pm 5.15pm Room: McCormack 02-0404 Instructor:

More information

Department of Bioinformatics and Computational Biology College of Science Student Handbook

Department of Bioinformatics and Computational Biology College of Science Student Handbook Department of Bioinformatics and Computational Biology College of Science Student Handbook Introduction This handbook describes policies and procedures for the Certificate, M.S., and Ph.D. Bioinformatics

More information

POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE

POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE Offices of the Dean of the College and the Dean of Students in the College COURSE REQUIREMENTS Students should

More information

IST553 Information Architecture for Internet Services

IST553 Information Architecture for Internet Services IST553 Information Architecture for Internet Services Syllabus Summer 2013 Instructor: Patrick W. Fitzgibbons, Ph.D. Telephone: 315-797-4062 e-mail: pwfitzgi@syr.edu Blackboard: Learning Management System:

More information

CS479/579 Special Topics: Social Computing Syllabus. Computer Science Department, New Mexico State University 01/20/2016 05/13/2016

CS479/579 Special Topics: Social Computing Syllabus. Computer Science Department, New Mexico State University 01/20/2016 05/13/2016 1. Course Time & Venue CS479/579 Special Topics: Social Computing Syllabus Computer Science Department, New Mexico State University 01/20/2016 05/13/2016 Class: Tuesday, Thursday, 17:25 pm -18:40 p.m.,

More information

BUSA 501: Introduction to Business Analytics

BUSA 501: Introduction to Business Analytics BUSA 501: Introduction to Business Analytics COURSE SYLLABUS: Spring 2016 01W Instructor: Dr. Bo Han Email Address: bo.han@tamuc.edu To protect your academic privacy, please always send me emails from

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Sweden https://www.youtube.com/watch?v=kpyvenbpj5c

More information

Tele3119 Trusted Networks Course Outline 2013

Tele3119 Trusted Networks Course Outline 2013 Tele3119 Trusted Networks Course Outline 2013 Staff Contact: A/Prof Robert Malaney, Email: r.malaney@unsw.edu.au Course Aim The main aim of this course is to develop a solid understanding of the key concepts

More information

ISM 280-05 and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015

ISM 280-05 and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015 The University of North Carolina at Greensboro The Bryan School of Business and Economics Department of Information Systems and Supply Chain Management 1 Professor: Email: Office: Office hours: Phone:

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Course Introduction Pavel Laskov Wilhelm Schickard Institute for Computer Science Computer security in headlines Technische Universität B» Internet als Risikofaktor?»

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

MIS 416 01W: Mobile Business

MIS 416 01W: Mobile Business MIS 416 01W: Mobile Business COURSE SYLLABUS: Spring 2015 Instructor: Dr. Bo Han Email Address: bo.han@tamuc.edu To protect your academic privacy, please always send me emails from your tamuc.edu email.

More information

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H17V 34 Superclass: CB Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is designed

More information

2nd CYCLE MASTERS STUDY PROGRAMME IN COMPUTER AND INFORMATION SCIENCE

2nd CYCLE MASTERS STUDY PROGRAMME IN COMPUTER AND INFORMATION SCIENCE 2nd CYCLE MASTERS STUDY PROGRAMME IN COMPUTER AND INFORMATION SCIENCE 1. General Information The2 nd cycle masters study of Computer and Information Science is a two-year programme (4 semesters) with a

More information

Computer and Network Security

Computer and Network Security EECS 588 Computer and Network Security Introduction January 12, 2016 Alex Halderman Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components

More information

ECE 156A - Syllabus. Lecture 0 ECE 156A 1

ECE 156A - Syllabus. Lecture 0 ECE 156A 1 ECE 156A - Syllabus Lecture 0 ECE 156A 1 Description Introduction to HDL basic elements, HDL simulation concepts, HDL concurrent statements with examples and applications, writing HDL for synthesis, and

More information

Why Security Matters. Why Security Matters. 00 Overview 03 Sept 2015. CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Why Security Matters. Why Security Matters. 00 Overview 03 Sept 2015. CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1 CSCD27 Computer and Network Security Instructor: Alan Rosselet Office: IC-494 E-mail: rosselet @ utsc utoronto ca Web: http://www.utsc.utoronto.ca/~rosselet/cscd27/ 00 Overview CSCD27 Computer and Network

More information

How To Prepare And Manage A Project

How To Prepare And Manage A Project University of Split Department of Professional Studies PREPARATION AND PROJECT MANAGEMENT COURSE SYLLABUS 1 COURSE DETAILS Type of study programme Study programme Course title Course code ECTS (Number

More information

DEPARTMENT OF INFORMATION SCIENCE. INFO221 Application Software Development COURSE OUTLINE

DEPARTMENT OF INFORMATION SCIENCE. INFO221 Application Software Development COURSE OUTLINE DEPARTMENT OF INFORMATION SCIENCE INFO221 Application Software Development COURSE OUTLINE Semester Two, 2014 Paper Description and Aims This course involves a study of the principles and practise of Application

More information

(Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science

(Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science (Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science In this masters program, a focus on one of these areas will be selected by the student Modules

More information

Earth System Science. Curriculum. Master of Science

Earth System Science. Curriculum. Master of Science Contact University of Hohenheim Study Counselling Prof. Dr. Volker Wulfmeyer Dr. Andreas Behrendt 70593 Stuttgart Germany Phone +49 (0)711 459-22313 counselling-ess@uni-hohenheim.de www.uni-hohenheim.de/ess

More information

Advanced ANDROID & ios Hands-on Exploitation

Advanced ANDROID & ios Hands-on Exploitation Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages

More information

June 2014 WMLUG Meeting Kali Linux

June 2014 WMLUG Meeting Kali Linux June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed

More information

CIS 213 PENETRATION TESTING 3 cr. (2-2)

CIS 213 PENETRATION TESTING 3 cr. (2-2) JOHN A. LOGAN COLLEGE M. Rogers SP 15 CIS 213 PENETRATION TESTING 3 cr. (2-2) COURSE DESCRIPTION: This course teaches students the underlying principles and many of the techniques associated with the cybersecurity

More information

Syracuse University School of Information Studies. IST553 - Information Architecture for Internet Services. Tentative Syllabus - Spring 2015

Syracuse University School of Information Studies. IST553 - Information Architecture for Internet Services. Tentative Syllabus - Spring 2015 Syracuse University School of Information Studies IST553 - Information Architecture for Internet Services Tentative Syllabus - Spring 2015 Instructor: Patrick W. Fitzgibbons, Ph.D. e-mail: pwfitzgi@syr.edu

More information