Course presents an overview of theory, techniques and protocols that are used to ensure that networks are able to defend themselves and the end-systems that use networks for data and information communication. Modeling of threats to networked systems, attack modeling with attack trees/graphs, cyber physical systems survivability to attacks, and behavior modeling of malware are explored. Network simulation/emulation using tools such as Scalable Simulation Framework (SSFNet), OPNET, or NS3 are examined. Application of industry-standard security protocols, such as, Secure Socket Layer (SSL), Transport Layer Security (TLS), IP-Security (IPSec), Public Key Infrastructure (PKI), WEP, WPA, etc. for engineering the security of networked systems will also be discussed.
|•||•||•||7:10 - 9:50 PM||•||•|
Anothony W. Dean • Ph: 757-683-7121 • firstname.lastname@example.org