Skip to content

Latest commit

 

History

History
7 lines (4 loc) · 766 Bytes

README.md

File metadata and controls

7 lines (4 loc) · 766 Bytes

EECS-354

The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer system and networking security, with detailed analysis of real-world examples and hands-on practice. Topics include the basic crypto, authentication, reverse engineering, buffer overflow attacks, vulnerability scanning, web attacks, firewalls, intrusion detection/prevention systems, etc.

Projects 1-3, 5 are included (except overflows since I unfortunately forgot where I stashed it) and their solutions. Labs aren't included since the problem statements are pretty easy to follow and they essentially give the answer if you do it.

Course website: http://hamsa.cs.northwestern.edu/