This course covers both attacker and defender perspectives of applied information security. Topics will include networked and embedded applications, access control systems and their failure modes, privilege escalation, intrusion detection, privacy and data breaches and applied cryptography. Each topic will be approached through analysis and discussion of historical cybersecurity incidents and possible mitigations. Safe coding practices and OS flaw mitigation will be explored through case studies and reinforced through security sensitive programming projects. Coursework will include penetration testing, code auditing, and independent projects.
Prerequisites: ECE 303, ECE 357
Course Code: ECE 455