Document Type
Syllabus
Description
This course introduces security hardening of a single system, and how to protect it when connected to a network. It explains how malware can compromise security and privacy from the moment a machine is powered on until shut down. Topics include Privilege Escalation, Buffer Overruns, Network Packet Mangling, Session Hijacking, Firewalls, and ethics. Lab work uses tools such as nmap and Kali (BackTrack) Linux. Prerequisites: CEG4350
Publication Date
Fall 2013
College
College of Engineering and Computer Science
Department
Computer Engineering
Course Number
CEG 4420/6420-01
Comments
Section 01 of CEG 4420/6420: Host Computer Security.