CPE 4800 - Information Security

3 lecture hours 2 lab hours 4 credits
Course Description
This course provides a survey of information security consisting of case studies, the business case for security, principles of security, classes of vulnerabilities, and the principles of cryptography. Cryptography topics are covered in depth, including secret and public key methods, stream ciphers, and related tools and standards.
Prereq: Third-year standing in any CSSE or ECBE department program
Note: None
This course meets the following Raider Core CLO Requirement: None
Course Learning Outcomes
Upon successful completion of this course, the student will be able to:
  • Discuss the business case and the need for an increased focus on computer security, including types of vulnerabilities (social engineering, insecure libraries, etc.) and how current vulnerabilities are disseminated by the software community
  • Analyze computing systems with an awareness of various timely legal issues related to security and privacy
  • Choose appropriate security implementation techniques based on secret and public key cryptography, the use of hashing, and other cryptographic principles
  • Appraise competing tools for common security practices, such as public key encryption, firewalling, and securing network traffic

Prerequisites by Topic
  • Familiarity with a programming language and basic procedural programming concepts
  • Intermediate engineering or science knowledge appropriate to the student's major

Course Topics
  • Guest speakers
  • History and overview
  • Tools, standards, and engineering constraints
  • Confidentiality, security, and integrity
  • Vulnerabilities: technical and human factors
  • Resource protection models
  • Cryptography: secret key, public key, stream ciphers, MACs
  • Cryptography tools and standards such as Kerberos and PGP
  • Network and web/database security
  • Host-based security
  • Authentication
  • Trusted computing
  • Side channel attacks
  • Stack overruns or buffer overflow in C

Laboratory Topics
  • Basic network traffic analysis
  • Network enumeration
  • Encryption and tunneling
  • Firewall configuration
  • Rogue wireless system detection
  • Vulnerability assessment of network resources
  • Setting up wireless systems
  • Wireless site surveying
  • Intrusion detection
  • Student presentations

Coordinator
Dr. Eric Durant


Print-Friendly Page (opens a new window)