Read our cookies policy and privacy statement for more information.
×Cleveland, Ohio
A comprehensive study of security vulnerabilities in information systems and the basic techniques for developing secure applications and practicing safe computing. Topics including common attacking techniques such as buffer overflow, Trojan, virus, and others. UNIX, Windows, and Java security; conventional encryption; Hash functions and data integrity; public-key encryption (RSA, Elliptic-Curve); digital signature; watermarking for multimedia; security standards and applications; building secure software and systems; legal and ethical issues in computer security.
Units: 3.0