80 likes | 101 Views
Join the grad-level course on network security basics and current issues. Learn about cryptography, network security designs, and more. Explore key research papers and implement new skills. Stay updated on latest attacks and countermeasures!
E N D
CSCE 715:Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina
About Me • Chin-Tser Huang • Ph.D. in Computer Sciences, University of Texas at Austin • Research in network security, network protocol design and verification, distributed systems • My web page can be found at http://www.cse.sc.edu/~huangct (C) 2010 Chin-Tser Huang
About You • What’s your name? • Where are you from? • When did you join USC? • What are your research interests? (C) 2010 Chin-Tser Huang
About the Course • A grad-level course focusing on basics and issues in network security • First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs • Second half will be your chance to present what you have learned from key research papers (C) 2010 Chin-Tser Huang
Course Information Online • http://www.cse.sc.edu/~huangct/CSCE715F10/index.htm • List of assigned paper and useful links are available on the page • Lecture slides will be available online too (C) 2010 Chin-Tser Huang
Why Should You Take This Course • Security is an increasingly important issue • You want to have basic knowledge about network security • You can learn latest attacks and newest skills to counter those attacks • You have a chance to implement the skills learned in the class (C) 2010 Chin-Tser Huang
Your Best Strategy • Come to every lecture to learn basic security problems and skills to counter them • Keep yourself exposed to articles related to network security to collect project ideas • Read each assigned paper and write good summary for each paper • Do not wait till last minute to prepare for exam or work on project • Enjoy the fun! (C) 2010 Chin-Tser Huang
Next Class • Type of attacks • Network security services • Formal specification and verification of network protocols • Read Ch. 1 (C) 2010 Chin-Tser Huang