UP | HOME
a_software.gif
tercer_nivel_software.gif

UPM / IMDEA Track in Software Development through Rigorous Methods

Computer security

Coordinator(s)/Instructor(s)

Length

4 credits (ECTS)

Prerequisites

Knowledge of operating systems. An introductory course in computer security or operating systems is desired but not required. Basic knowledge on number theory and networking is a plus.

This course has specific requirements, and if your initial level is not adequate, you may not pass. Therefore, we ask you to please include it in the mail you ought to send to graduate.school (at) software.imdea.org with the list of courses you want to take from the IMDEA track. You will receive a mail stating the courses in which you are welcome to enroll. If you enroll in an IMDEA Track course for which you did not receive explicit approval, you may be asked to switch over to a different one.

Course web page (if any)

Not yet available.

Summary and objectives

This course provides the student with a broad understanding of the common notions in computer security. In addition to providing background on general security concepts, the course describes specialized topics in the areas of cryptography as applied in modern systems; systems security including operating system and network security; and software security including common coding pitfalls, vulnerabilities, and defenses.

Topics

  1. General security concepts (2 sessions)
    • Security properties
    • Security layers, principles
  2. Applied cryptography (5 sessions)
    • Symmetric-key cryptography
    • Public-key cryptography
    • Signatures, MACs
    • Security protocols
    • Cryptographic attacks
  3. System security (4 sessions)
    • Operating systems security
    • Trusted computing
    • Network security
  4. Software security (5 sessions)
    • Vulnerabilities
    • Defenses
    • Malware

Evaluation

Course evaluation will be a weighted average of different items, which may include: a practical exercise where students will apply the learned concepts by performing an analysis of a real-world security scenario or implementing a security defense, a final exam where students will demonstrate their understanding of theoretical concepts, small exercises for any of the course sections, and the student's participation in the course.

Recommended reading

  • Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses. Edward Skoudis and Tom Liston. Prentice Hall, Second edition (January 2006).
  • Security Engineering: A Guide to Building Dependable Distributed Systems. Ross J. Anderson. Wiley, Second edition (April 2008). http://www.cl.cam.ac.uk/%7Erja14/book.html.
  • Software Security: Building Security In. Gary McGraw. Addison-Wesley Professional (February 2006).
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C. Bruce Schneier. Wiley; 2nd edition (October 18, 1996)
  • Crypttool http://www.cryptool.org/.




Back to the initial page
Go to the IMDEA Software Institute page

Fractals are used with permission from their author Cory Ench | © 2006-2007. IMDEA Software.
All rights reserved | Legal Notice | Privacy Policy