ECE 5586 - Information Technology Security and Trust
Advanced security and trust concepts and implementation in wired and wireless computer networks and computer systems; malware defenses, impact of channel fragility, node mobility, cooperative functionality, and resource constraints on security and trust at the different layers of the Internet protocol stack. MIT Students Only (Master of Information Technology)
Why take this course?
Major Measurable Learning Objectives
Design secure applications and systems.
Implement access controls.
Use computer-based tools to identify untrustworthy software or communication circumstances.
Implement and evaluate advanced attack mitigation and recovery techniques and technologies for various types of attacks at the different network layers.
Describe the lifecycle of a trustworthy wireless network.
Describe vulnerabilities and attacks on state-of-the-practice wireless networks.
Describe key security, privacy, trust and performance metrics in wireless networks.
Determine Return on Security Investment (ROSI).
Percentage of Course
1. Overview of system and networking and applications
2. Measures to secure applications
3. Money, property - E-banking, digital signatures
4. Hardware-based security
5. General system vulnerability analysis and penetration testing