Skip to content
@bucs558

Binghamton University CS 458, CS 558

Classroom Organization for CS 458, CS 558 - Introduction to Computer Security

CS 458, CS 558: Introduction to Computer Security

🛈 Description

This course teaches a broad range of computer security topics, including basics of cryptography, network security, software security, and system security. Students are expected to learn the fundamental concepts of computer security from lectures and gain hands-on experiences from multiple project assignments.

Purpose

This course is designed to provide a solid foundation and background in computer security, preparing you for later courses in the Master of Science in Computer Science Cybersecurity Track

Learning Objectives

Upon successful completion of this course, you will be able to:

  • Demonstrate an understanding of cryptography, including symmetric and public-key encryption algorithms, digital signature, key management, and authentication protocols.
  • Demonstrate an understanding of common system vulnerabilities and solutions that address them.
  • Demonstrate an understanding of network security.
  • Demonstrate an understanding of malicious software, including virus, worm, trojan horse, rootkit, backdoor, etc.
  • Demonstrate an understanding of intrusion detection and access control.
  • Demonstrate the ability to program with security libraries.
  • Demonstrate the use of some mathematical concepts and formal techniques in the design and analysis of security software.

🕮 Bibliography

Note: subsequent editions are acceptable alternatives.

Required

  • Computer & Internet Security: A Hands-on Approach, Third Edition, Wenliang Du (2022). ISBN: 978-1733003940

Supplemental

  • Information Security: Principles and Practice, Second Edition, Mark Stamp (2011). ISBN: 978-0470626399
  • Computer Security: Art and Science, Second Edition, Matt Bishop (2018). ISBN: 978-0321712332
  • Cryptography and Network Security: Principles and Practice, Eighth Edition, Willam Stallings (2016). ISBN: 978-9357059718
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Michael Sikorski and Andrew Honig (2012). ISBN: 978-1593272906

Popular repositories Loading

  1. .github .github Public

    Public repository containing organization profile

Repositories

Showing 1 of 1 repositories
  • .github Public

    Public repository containing organization profile

    bucs558/.github’s past year of commit activity
    0 0 0 0 Updated Mar 30, 2024

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…