• ""
  • ""

Welcome To CSCI 345

Why you should take this class (or why this class may change your life!):

At the end of this course, you will be able to:

  1. Examine the architecture of a cyber system, i.e., software, operating system, computer network, to discover vulnerabilities, evaluate and propose defense mechanisms
  2. Use or develop tools for pen testing and vulnerability assessment
  3. Discover different types of network intrusions based on their key features
  4. Describe and evaluate the effectiveness of firewalls and VPNs
  5. Develop rules for Intrusion Detection/Prevention Systems and evaluate these using statistical Receiver Operating Characteristic (ROC) curves
  6. Develop a buffer overflow attack and propose defense mechanisms
  7. Point out non-secure programming practices and substitute these with secure programing and input sanitizing technique
  8. Evaluate and propose defense mechanisms
  9. Point out non-secure programming practices and substitute these with secure programing and input sanitizing technique
  10. Understand key concepts: HTTPS, SSL, IPSec, IEEE 802.11 wireless security and hypothesize their weaknesses
  11. Articulate laws and policies, ethical issues on cybersecurity
  12. Formulate social engineering scenarios to test the preparedness of their organization
  13. Compare security controls, human factors, education and training for cybersecurity