Document Type

Syllabus

Description

This course introduces security hardening of a single system, and how to protect it when connected to a network. It explains how malware can compromise security and privacy from the moment a machine is powered on until shut down. Topics include Privilege Escalation, Buffer Overruns, Network Packet Mangling, Session Hijacking, Firewalls, and ethics. Lab work uses tools such as nmap and Kali (BackTrack) Linux. Prerequisites: CEG4350

Publication Date

Fall 2013

College

College of Engineering and Computer Science

Department

Computer Engineering

Course Number

CEG 4420/6420-01

Comments

Section 01 of CEG 4420/6420: Host Computer Security.


Share

COinS