![]() ![]() Develop the skills to recognize flawed design choices and careless programming errors that can be exploited by an attacker to gain control of a system, and learn how those problems can be remedied.ĭigital Forensics: Introduce the theory and application of computer forensics, an important area of computer security concerned with the preservation and recovery of digital evidence. Learn how trade-offs between security and performance affect the design choices of operating system programmers. Operating Systems Internals: Learn how operating systems are designed and implemented by examining code from modern Windows, Linux, and Mac OS X systems. Analyze malware ranging from simple examples that targeted MS-DOS through to modern examples that targeted Microsoft SQL Server and Windows. Learn how modern malware obfuscates its presence and activities. Develop an understanding of operating system internals and how they are exploited by malware. Reverse Engineering: Learn to analyze malware binaries, determine what a given malware does, and how it does it. Highlights of Cyber Security Concentration Give students practical experience with industry standard tools, frameworks, and investigation processes. ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |