University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

Instructor

John Franco

Registration Data

Credit Level: Graduate Credit Hrs: 3.00
Any one of the following is sufficient:
    1.   an undergraduate degree in computer science, computer engineering, or electrical engineering;
    2.   permission of the instructor.

Logistics

Course Description

Evaluation of systems and protocols to determine whether they are vulnerable to known attack vectors such as Return Oriented Programming, buffer overflow, exploitation of misconfigured systems, viruses, worms, side-channel attacks and others.

Keywords

Network Protocols, Confidentiality, Message Integrity, Authentication, Return Oriented Programming, System Configuration, Virus, Trojan, Worm, Side-Channel Attack.

ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson