|
Introduction to Operating Systems
|
- Threads, processes, concurrency, memory
management, I/O Control and case studies
| |
|
|
- Application layer - client-server architectures, P2P architectures, DNS and HTTP and Web applications.
- Transport layer - multiplexing, connectionless transport and UDP, principles or reliable data transfer, connection-oriented transport and TCP and TCP congestion control.
- Network layer - forwarding, router architecture, the IP protocol and routing protocols including OSPF and BGP
- Link layers - multiple-access protocols, ALOHA, CSMA/CD, Ethernet, CSMA/CA, wireless 802.11 networks and linklayer switches.
- Simple quantitative delay and throughput modeling, socket programming and network application development and Ethereal labs
| |
|
Design and Analysis of Algorithms |
- Data structures, priority queues, binary search trees, balanced search trees. Btrees.
- Algorithm design and analysis techniques illustrated in searching and sorting
- Design and analysis techniques: dynamic programming, greedy algorithms.
- Graph algorithms: elementary graph algorithms (breadth first search, depth first search, topological sort,
connected components, strongly connected components
| |
|
Information Security and Privacy |
- Information Systems Security and covers cryptography, capability and access control mechanisms, authentication models, security models, operating systems security, malicious code, security-policy formation and enforcement, vulnerability analysis, evaluating secure systems.
|
|
|
|
- Attacks and threats in computer networks, including network mapping, port scanning, sniffing, DoS, DDoS, reflection attacks, attacks on DNS and leveraging P2P deployments for attacks.
- Cryptography topics most relevant to secure networking protocols: block ciphers, stream ciphers, public key cryptography, RSA, Diffie Hellman, certification authorities, digital signatures and message integrity.
- Secure networking protocols, including PGP, SSL, IPsec and wireless security protocols.
- The course examines operational security, including firewalls and intrusion-detection systems.
- Lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.
| |
|
|
- Modern Cryptography from a both theoretical and applied perspective, with emphasis on “provable security” and “application case studies”.
- Cryptographic primitives that are building blocks of various cryptographic applications.
- Notions of security for a given cryptographic primitive, its various constructions and respective security analysis based on the security notion
- Pseudorandom functions, symmetric encryption (block ciphers), hash functions and random oracles,
message authentication codes, asymmetric encryption, digital signatures and authenticated key exchange.
- Secure cryptographic protocols(e.g., secure message transmission, identification schemes, secure function evaluation, etc.)
- Number-theoretic assumptions upon which cryptography is based.Also covered: implementation issues (e.g., key lengths, key management, standards, etc.)
|
|
|
- Design and implementation of secure applications.
Concentration is on writing software programs that make it difficult for intruders to exploit security holes
- Writing secure distributed programs in Java. The security ramifications of class, field and method visibility are emphasized.
| |
|
Advanced Design and Analysis of Algorithms |
- Techniques in advanced design and analysis - Amortized analysis of algorithms
- Advanced data structures - binomial heaps, Fibonacci heaps, data structures for disjoint sets,analysis of union by rank with path compression
- Graph algorithms - Elementary graph algorithms, maximum flow, matching algorithms
- Randomized algorithms - Theory of NPcompleteness and approach to finding (approximate) solutions to NPcomplete problems.
| |
|
Penetration Testing and Vulnerability Analysis |
- Computer and network security focuses on penetration testing and vulnerability analysis
- Methodologies, techniques and tools to analyze and identify vulnerabilities in stand-alone and networked applications.
| |
|
Security Engineering and Management |
- A system and management view of information security
- Integration of security into the systems-design process and life-cycle security management of information systems
- Government information security and methodologies
- Information-security risk management, security policies,security in the systems-engineering process, laws related to information security and management of operational systems.
|
|
|
Digital Forensics and Biometrics |
- Information-technology professionals to the application of forensic science principles
and practices for collecting, preserving, examining, analyzing and presenting digital evidence.
|
|
|