Technical skills in building a secure browsing environment and analyzing the security properties of a browsing environment. Students will learn the security mechanisms deployed in browsers and apply that knowledge toward securing the web. Students will learn to critically analyze the security properties of websites and browser mechanisms.
Full Answer
Some of today's most damaging attacks on computer systems involve the exploitation of network infrastructure, either as the target of the attack or as a vehicle to advance attacks on end-systems. This course provides an in-depth study of network attack techniques, and the methods used to defend against them.
Poor software design and engineering are the root causes of most security vulnerabilities in deployed systems today.
A wide array of communication and data protections employ cryptographic mechanisms. This course explores modern cryptographic (code making) and cryptanalytic (code breaking) techniques in detail.
This course will enable students to understand how software coding defects lead to software vulnerabilities, develop secure software, and manage teams that develop secure software.
The growing importance of information systems, and their use to support safety-critical applications, has made information security a central issue for modern systems.
This course focuses on practical applications of Information Assurance (IA) policies and technologies in enterprise network environments.
The goal of this course is to develop the student's capability for applying risk management concepts specifically to the challenges of information security. An in-depth examination of the information security risk assessment and control process is covered, as well as the differences between qualitative and quantitative risk management.