Courses


Fundamentals of Cybersecurity, Summer 2020

Major security breaches routinely make headline news and impact the lives of millions of people. Cybercrime is a multi-million dollar, mature business. Advanced, persistent threats posed by nation-state adversaries are beginning to impact critical infrastructure, and even democratic processes themselves. As technology becomes embedded in ever more facets of our lives, society, business, and government, the need for cybersecurity experts to protect our infrastructure grows. The course goals are the following:

  • Provide a solid understanding of the core cybersecurity principles and concepts, including systems and communication security
  • Introduce the breadth of topics in the cybersecurity space
  • Provide hands-on experience in achieving essential security properties like confidentiality and integrity, as well as desirable properties like least privilege and defense in depth

Topics covered by this course include:

  • Security foundations
  • Authentication and Access Control
  • Access Control
  • Social Engineering
  • System Security
  • Web security
  • Threat Modeling, Infection Vectors
  • DDoS, Malware
More »

Software Vulnerabilities and Security, Spring 2020

This course deals with common programming, configuration, and design mistakes and ways to detect and avoid them. Examples are used to highlight general error classes, such as stack and heap overflows. Possible protection and detection techniques are examined. The course includes a number of practical lab assignments where participants are required to apply their knowledge as well as a discussion of the current research in the field. The course goals are the following:

  • Provide a solid understanding of the core cybersecurity principles and concepts, including systems and communication security
  • Learn how the security of systems can be violated, and how such attacks can be detected and prevented
  • Learn what it takes to reverse engineer a piece of code, and exploit a vulnerable program

Topics covered by this course include:

  • Network Traffic Analysis
  • UNIX Security
  • SQL Injection
  • Memory Corruption, Buffer Overflow, Heap Overflow
  • Reverse Engineering and Binary Analysis
  • Web Security
  • Evasion, Malware, Exploit
More »