Class communication
Note: We will be using eLearn/canvas for assignments and discussions/help.
Textbooks (Recommended but NOT required)
- Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Paul C. van Oorschot. (Good for concise explanations)
- Computer Systems: A Programmer's Perspective, Randal E. Bryant and David R. O'Hallaron. (Great for assembly language and low-level programming)
- Computer Security: Principles and Practice 2/E or 3/E, William Stallings and Lawrie Brown (Comprehensive and detailed coverage of security)
- Hacking: The Art of Exploitation, 2nd Edition (Focus on software vulnerability and exploitation)
- Network security: private communication in a public world by Kaufman, Perlman, and Speciner.
Catalog Description
Covers the principles and practice of computer security in software, systems, and networks. Significant emphasis will be put on hands-on experience to facilitate a deeper understanding of security.
Policies on Assignments, Projects and Exams
You have 4 slack days that you can use on any one assignment (homework or project) or combination of assignments. For group assignments, 1 day is assessed to each partner. Penalty is 10% per late day after that. Saving all 4 slack days will grant you an extra 2% credit (all or nothing).
Exam date can be found on the class schedule page. No alternative make up exam will be given without a documented excuse such as a major health issue.
Getting help from the instructor and TA
During instructor or TA office hours, please feel free to stop in any time without an appointment. Any other time, please email the instructor to make an appointment at some mutually convenient time. You may also try to "drop in" for help, but please keep in mind that we may not be able to accommodate you.
Please come to us early if you feel you are having trouble keeping
up. If you do your part (put in the effort, start early on
assignment, come to class), we will do our best to help you stay on
top.
Grade Breakdown
Grades will be weighted as follows:
Component | Weight |
Projects (4 total) | 30% |
Homeworks (2 total) | 15% |
Mid-term | 20% |
Final Exam | 30% |
Participation (e.g., attendance, questions, forum activities, and intellectual contributions) | 5% |
Ethics, Laws, and University Policy
To understand where security weaknesses may occur and defend them, you will learn skills to perform attacks against real systems. However, abusing the skills in real world can lead to serious consequences at many levels, including violation of university rules and being repelled by the university, and breaking the laws and spend time in jail. In addition, if you do not respect the security/privacy and rights of other users in the class, you will FAIL the class.