Thinking Differently About Security Protection and Prevention
CourseDescription
1. Computer Architecture Course - MIPS programming, Dynamic pipelining (Tomasulo algorithm),
Cache-write/replacement policy,Cache coherence, Loop Unrolling, Dynamic Branch Prediction
Advanced Computer Design Course - System Verilog, Unidirectional and Bidirectional Bus
architectures, SRAM, SDRAM and flash memories
Computer Network Design - Network Topology and Queueing theory, OSI reference model
Network Programming and Applications - Development of software for building distributed
applications. Application Programming Interfaces: BSD Sockets, Winsock, Remote Procedure
Call. Raw Sockets, Multi-threading, Concurrency.
Network Security -
White Hat Hacking
Reconnaissance using HTTrack, Harvester, whois, Maltego.
Vulnerability Scanning using Nessus.
Exploitation and gaining access using John the ripper, Medusa and Armitage.
Arp Spoofing, Active Sniffing through Port Stealing, MITM against HTTPS and SSH
Web Hacking using Nikto, WebScarab, SQL Injection, Cross Site Scripting (XSS)
Cryptographic Techniques
Public Key Cryptography and RSA, Advanced Encryption Standard, Block Ciphers and Data
Encryption Standard
System Software - Program structure and execution, Concurrent programming, Virtual
Memory, System-Level I/O, Exceptional Control Flow, Linking
1