Course Description
This course introduces contemporary cybersecurity threats facing organizations. Students explores issues that arise in the design, implementation and production of systems to understand security limitations and possible opportunities for attackers. The class is focused around multiple lab units that explore diverse and important aspects including networking, architecture, cryptography, databases and web security. Each unit will explore a system, its design, its vulnerabilities and how to exploit them. Each unit will explore a system, its design, its vulnerabilities and how to exploit them. Moreover, students will learn about implementations and deployment of counter-measures to eliminate the vulnerabilities and nullify the threat. The main focus of the class is giving the students practical hands-on experience alongside a good understanding of different system vulnerabilities, risks and countermeasures.

This course will focus on security with several different examples, the following table summarize our topics.

Info

Topics

Intro

syllabus, policies, Lab settings and projects

Ethical and Legal Implications

Project 1

Password Cracking

Project 2

Network protocols

Project 3

Buffer Over flow

Project 4

Web Security

Project 5

Exploitation and vulnerability validation – Metasploit

Project 6

Crypto/cloud security