Prerequisite: COMP 150 or COMP 170
This course covers techniques and algorithms for detecting unusual usage patterns that typically signal a break-in, including techniques for detecting evasive or stealthy attacks. Also covered are differences in detecting local versus network intruders. Additional topics: computer viruses, computer security management, computer forensics.
Outcomes: Students will learn to configure ID systems (e.g. SNORT) and analyze their output. They will also understand both network-based and host-based monitoring techniques.
This course covers techniques and algorithms for detecting unusual usage patterns that typically signal a break-in, including techniques for detecting evasive or stealthy attacks. Also covered are differences in detecting local versus network intruders. Additional topics: computer viruses, computer security management, computer forensics.
Outcomes: Students will learn to configure ID systems (e.g. SNORT) and analyze their output. They will also understand both network-based and host-based monitoring techniques.