E-mail: carbunar at gmail dot com
Office hours: Thursdays, 2-3pm, ECS 383.
Web page: http://www.cs.fiu.edu/~carbunar/teaching/cen5079/cen5079.S.2018/cen5079.html
Class time and location:
Thursday, 11:00am-1:45pm: GL 139
List of course topics (tentative):
The following schedule is tentative and subject to change.
|Week 1||January 11||Class overview; Introduction to security||Slides [pdf]|
|Week 2||January 18||Symmetric Key Crypto||Slides [pdf]|
|Week 3||January 25||Public Key Crypto||Slides [pdf]|
|Week 4||February 1||Key Management and Distribution||Slides [pdf]|
|Week 5||February 8||Authentication||Slides [pdf]|
|Week 6||February 15||Access Control||Slides [pdf]|
|Week 7||February 22||Integrity||Slides [pdf]|
|Week 8||March 1||TBA|
|Week 9||March 8||Midterm||11am - 1pm: GL 139: All students|
|Week 10||March 15||Spring Break|
|Week 11||March 22||Class canceled|
|Week 12||March 29||Program Security and Vulnerabilities||
Link: Aleph One's Smashing the Stack for Fun and Profit
Link: Wenliang Du's Buffer Overflow Lab
|Week 13||April 5||Malware||Slides [pdf]|
|Week 14||April 12||Network Security||Slides [pdf]|
|Week 15||April 19||Final Revision|
|Week 16||April 26||Final exam||9:45am - 11:45am: GL 139|
In this class we discuss vulnerabilities in widely-deployed computer systems. This is not intended as an invitation to exploit those vulnerabilities. It is important that we be able to discuss real-world experience candidly; students are expected to behave responsibly.
You may not break into machines that are not your own; you may not attempt to attack or subvert system security. Breaking into other people's systems is inappropriate, and the existence of a security hole is no excuse.
Unethical or inappropriate actions may result in failing the course and being referred for further discipline.
Homeworks are to be done individually, on your own (not in groups).
For homeworks, you must always write up the solutions on
your own. Similarly, you may use references to help solve homework problems,
must write up the solution on your own and cite your sources.
You may not share written work or programs with anyone else.
Back to main page