DOC PREVIEW
U of I CS 498 - Introduction to Cyber Security Lab

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction to Cyber Security LabAdministriviaClass StructureClass Non-GoalTopicsMore TopicsReading MaterialsCourse EvaluationQuestions for the classIntroduction to Cyber Security LabSusan HinrichsSpring 20061/17/2006 Cyber Security Spring 2006Administrivia• Meet Tuesdays/Thursdays 9:30-10:45am 1111 SC• Security lab in 222 SC• Office hours in lab, time TBA– [email protected]– Office 4224 SC• Newsgroup cs.class.cs498sh• Web site http://www.cs.uiuc.edu/class/cs498sh1/17/2006 Cyber Security Spring 2006Class Structure• Complements introductory security courses like Information Assurance– Teach computer and network security mechanisms used in the field– Teach design techniques– A sampling of security technologies• Class meetings– Approximately half in 1111 providing background material or guest lectures– Approximately half in lab1/17/2006 Cyber Security Spring 2006Class Non-Goal• Class will not make you expert in any particular security technology• If that is your goal, better to take a specific technology training course or self study1/17/2006 Cyber Security Spring 2006Topics• Secure Programming – Least-privilege programming and impersonation – Input cleanliness – Worm anatomy • OS security – Windows ACLs and security policies – Vista security additions – SE Linux domain type enforcement policies – Mandatory access controls in SE Linux and perhaps other OS's– User identity • Database Security 1/17/2006 Cyber Security Spring 2006More Topics• Network Security – Firewall configuration – IPSec–IPv6 – Access control servers – Network intrusion detection and monitoring – Honey pots – Wireless security – Network scanning • Defensive system design – Security architectures – Penetration testing 1/17/2006 Cyber Security Spring 2006Reading Materials• Required book from Information Assurance– Computer Security: Art and Science, Bishop• Supplemented with many papers and manuals1/17/2006 Cyber Security Spring 2006Course Evaluation• Lab exercises – 50%• 2-3 Papers at the end of sections – 25%• Final design project – 25%• Folks taking for graduate credit will have extra requirements for Lab exercises and papers1/17/2006 Cyber Security Spring 2006Questions for the class• Have you taken an introductory security class?• Are you familiar with Windows and/or Linux?• Are you comfortable with C, C++, and/or Java?• Are you familiar with IP networking?• What do you hope to get out of this class?1/17/2006 Cyber Security Spring


View Full Document

U of I CS 498 - Introduction to Cyber Security Lab

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download Introduction to Cyber Security Lab
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Cyber Security Lab and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Cyber Security Lab 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?