This course describes computing practices that one should adopt to improve security in all computer work. It describes the use of cryptography, without getting into crypto alogrithms, such as MD5, SHA1. Topics include secure deletion of files, secure wireless connections, Covert channels, Steganography, Sandboxes, Zombie Machines, DDoS and Man-in-the-Middle Attacks. Lab work uses tools such as ssh, TrueCrypt, GnuPGP, virtual-box.
Undergraduate level CEG 4350 Minimum Grade of D or Graduate level CEG 6350 Minimum Grade of D