1 / 9

Applied Security

Applied Security. Breno de Medeiros Florida State University Spring 2007. What is this course about?. Learning how to 0wn the Internet for fun and profit. No, really: Learning how to make computer systems more secure in practice. (Labs + lecture)

perezjose
Télécharger la présentation

Applied Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Applied Security Breno de Medeiros Florida State University Spring 2007

  2. What is this course about? • Learning how to 0wn the Internet for fun and profit. • No, really: • Learning how to make computer systems more secure in practice. (Labs + lecture) • Source: printed materials/lab assignments/other • Learning new trends in computer threats and appropriate countermeasures (Lecture + individual reading) • Source: Assigned papers/other

  3. Should I take this course? • If you have to. • If you find the subject appealing, and think that everything worth it takes work. • Don’t take this course: • If this slide’s background is where you would like to spend a great deal of time this semester.

  4. Course main references • http://www.cs.fsu.edu/~breno/CIS-5930/ • Textbook: • None. Printed materials distributed in class. Reading assignments posted one week in advance. • Recommended: • Computer Security: Art & Science, by Matt Bishop, Addison-Wesley • Internet Denial of Service, Attack and Defense Mechanisms, by Jelena Mirkovich et al. Prentice Hall. • Inside Network Perimeter Security, by Stephen Northcutt et al. 2nd edition. Sans Institute Press.

  5. Classroom Lectures • Whenever no lab meeting announced • Cover theory, (some) from notes, much from the assigned reading (research papers). • Mid-term exam and final will cover this material.

  6. Lab Meetings • Announced in advance (in the website and during the prior lecture meeting) • Covers some of the material in a practical setting • Introduces the lab assignments. • Lab assignments will be given regularly. • Deliverables in the form of reports and/or code.

  7. Project • You are required to work on a project during this course. It must include: • An element of originality. Implementing an existing application/service (without add-ons) is discouraged. • A practical component (implementation or configuration of software, or system design). Literature review alone will not be sufficient.

  8. Grading • One Midterm: 10%; Final: 10% • Lab assignments: 40%; Project: 40% • Grade scale: • A: 91 - 100; A-: 89, 90. • B: 77 - 88 • C: 65 - 76 • D: 55 - 64 • F: 0 - 54

  9. Questions?

More Related