DOC PREVIEW
Pitt IS 2150 - IS 2150 Course Schedule

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1IS2150/TEL2810 Introduction to Security Tentative Course Schedule Week # Topic Objective: The students are expected to have the following capability after the lecture Testing Week 1 Sept 1 Introduction (Chapter 1) • Define/Describe/explain some key security terms • Describe/explain the importance of trust, assurance and operational issues within the security area • Homework 1 (2 Weeks) Week 2 Sept 8 Secure Design Principles; Access control in Unix and Windows • Explain the secure design principles and its importance • Recognize the basic access control mechanism in OS • Use access control commands to manipulate permissions in the OS • Quiz 1: (for Week 1) • Lab 1 (2 Weeks) Week 3 Sep 15 Mathematical Review; Security Policy • Write a sentence in logic form and interpret the logic expressions • Solve problems using mathematical induction • Interpret, analyze and construct lattice structures • Quiz 2 (for Week 2) • Homework 2 (1 Week) Week 4 Sep 22 HRU Access Control Matrix - Foundational Result • Represent/Describe formally the safety problem using ACM • Reason and Demonstrate the undecidability result related to security • Homework 3 (1 Weeks) Week 5 Sep 29 Confidentiality, Integrity and Hybrid Policy Models • Explain the confidentiality, integrity and hybrid policy models and relate them to application needs • Employ them to new applications and synthesize solution • Quiz 3: (for Week 4) • Lab 2 (Due: After October Break) • Homework 4 (Due: After October Break) Week 6 Oct 6 Oct 14 October Break Week 8 Oct 20 Midterm Homeworks/Labs are due by the end of the due date, i.e., by 11:59PM2IS2150/TEL2810 Introduction to Security Tentative Course Schedule (Cont.) Week 9 Oct 27 Basics of Cryptography and Network Security; Authentication and Identity • Recognize/explain and use the basic cryptographic techniques • Explain and employ the basic network security (e.g., authentication) techniques Project planning starts in week after midterm; • Homework 6 (Jumbo): Java programming Assignment (Due: Before Thanksgiving) Week 10 Nov 3 • Lab 3 (firewall) given out in start of week 9 (Due: Nov18) Week 11 Nov 10 Security Evaluation, Risk Management, Legal and Ethical Issues • Explain the main idea behind common criteria • Recognize the importance of risk management process and employ it to assess and solve organizational security • Recognize, define/explain legal and ethical concerns related to security • Quiz 5 (for Week 9) Week 12 Nov 17 Authentication and Id, Malicious Code, • Recognize, define/explain authentication techniques and Identity Mgmt issues • Recognize, compare/contrast, explain different types of malicious code • • Lab 4 (Before Final) Week 13 Nov 24 Thanksgiving Week 14 Dec 1 Vulnerability Analysis; Software security • Recognize, classify and compare vulnerability (taxonomy/classification) • Recognize, compare/contrast, explain different types of coding related software issues Week 15 Dec 8 IDS; Auditing; Firewalls Misc • Recognize, explain and analyze auditing/IDS/Auditing systems Quiz 6 (for Week 12, 13) Dec 14


View Full Document

Pitt IS 2150 - IS 2150 Course Schedule

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download IS 2150 Course Schedule
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view IS 2150 Course Schedule and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view IS 2150 Course Schedule 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?