how is the browser security course at cmu

by Shakira Hermiston 9 min read

Technical skills in building a secure browsing environment and analyzing the security properties of a browsing environment. Students will learn the security mechanisms deployed in browsers and apply that knowledge toward securing the web. Students will learn to critically analyze the security properties of websites and browser mechanisms.

Full Answer

18-731 Network Security

Some of today's most damaging attacks on computer systems involve the exploitation of network infrastructure, either as the target of the attack or as a vehicle to advance attacks on end-systems. This course provides an in-depth study of network attack techniques, and the methods used to defend against them.

18-732 Secure Software Systems

Poor software design and engineering are the root causes of most security vulnerabilities in deployed systems today.

18-733 Applied Cryptography

A wide array of communication and data protections employ cryptographic mechanisms. This course explores modern cryptographic (code making) and cryptanalytic (code breaking) techniques in detail.

14-735 Secure Software Engineering

This course will enable students to understand how software coding defects lead to software vulnerabilities, develop secure software, and manage teams that develop secure software.

14-741 Intro to Information Security

The growing importance of information systems, and their use to support safety-critical applications, has made information security a central issue for modern systems.

14-761 Applied Information Assurance

This course focuses on practical applications of Information Assurance (IA) policies and technologies in enterprise network environments.

14-807 Information Security Risk Management (2012)

The goal of this course is to develop the student's capability for applying risk management concepts specifically to the challenges of information security. An in-depth examination of the information security risk assessment and control process is covered, as well as the differences between qualitative and quantitative risk management.

image