The BRADLEY DEPARTMENT of ELECTRICAL and COMPUTER ENGINEERING

ECE 5585 Information Technology Security and Trust | ECE | Virginia Tech

Graduate PROGRAMS

Course Information

Description

Fundamental Internet and computer security principles and applications; legal and privacy issues, risk analysis, attack tecniques, intrusion detection concepts, basic computer forensics, and system and application security hardening techniques. MIT Students Only (Master of Information Technology).

Why take this course?

This class teaches Masters of Information Technology (MIT) students how to properly test computer systems, networks or applications for compliance with the laws, regulations, and policies enacted local, state, and federal governments. The requisite knowledge of these fundamental security concepts provides the student with the necessary background to enhance their academic and practical knowledge. The sequence also provdes the advanced trustworthy network concept required to be able to synthesize elements from networking, security, privacy and trust concepts, protocols and technology to affect defense-in-depth in modern computing and network systems, and to engineer and evaluate relevant security and trust solutions.

Prerequisites

Graduate Standing

Major Measurable Learning Objectives

  • Idendify the legal, privacy, and ethical aspects of computer security.
  • Analyze techniques used by hackers to penetrate systems and networks.
  • Analyze systems and software applications for security vulnerabilities and recommend corrective measures.
  • Identify common network and system attacks and devise plans to eliminate problems.
  • Explain core security issues related to wired/wireless networks.
  • Evaluate basic encryption techniques and specify appropriate security practices for specific situations.

Course Topics

Topic

Percentage of Course

1. Legal and ethical aspects of computer security 15%
2. Risk analysis 10%
3. User authentication 10%
4. Introduction to network security standards 10%
5. Cryptography and its role in computer security 10%
6. Software application security 15%
7. Penetration study methodologies 15%
8. Instrusion detection techniques 15%