University of Southern California Information Sciences Institute http://ccss.usc.edu/530/fall16/16-sylrl.html
Category: Academic Lectures
Permanent link to this article: https://www.darknessgate.com/2016/09/28/computer-science-530-syllabus-and-reading-list-fall-2016/
TSIT02 Computer security 2015
The course takes place in period HT2 and can be included in several of our longer educations, is compulsory for students taking the security profile and is also taken by many Master’s students, Erasmus students and others. There is a list below that briefly describes the course content, a description of the course goals can …
Permanent link to this article: https://www.darknessgate.com/2016/07/05/tsit02-computer-security-2015/
Network and Computer Security
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …
Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/
Introduction to computer forensics and investigations
Learning outcomes an understanding of the role of computer forensics in both the business and private world identify some of the current techniques and tools for forensic examinations describe and identify basic principles of good professional practice for a forensic computing practitioner become familiar with some forensic tools and know how to apply them in …
Permanent link to this article: https://www.darknessgate.com/2014/10/13/introduction-computer-forensics-investigations/
Intrusion Detection System
For students with experience in data mining and statistics, this class covers traditional types of intrusion and detection methods. Lecture materials are available for download and explore geospatial and physical intrusion detection, the lifecycle of vulnerability, visual data communications and Web application firewalls. Students can also access an assigned project; however, there isn’t any opportunity …
Permanent link to this article: https://www.darknessgate.com/2014/10/13/intrusion-detection-system/
Cryptography and Cryptanalysis
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/
Permanent link to this article: https://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/
Cryptography
This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …
Permanent link to this article: https://www.darknessgate.com/2014/09/30/cryptography/
An Introduction to Unix for Programmers
The goal of this course is to provide students with enough Unix to allow them to work productively in CS courses at the 300 level and beyond. Particular emphasis is placed on Unix tools and procedures that support the kind of programming students will face in assignments in those later courses. Because relatively few people …
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unix-programmers/
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unixlinux/
Introduction to UNIX
These lecture notes and exercises are designed to support an intensive introductory course on UNIX or to act as a reference to users who are new to UNIX. This course was designed particularly for use with the Linux operating system but much of it applies to other UNIX systems as well. These notes are also …
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unix/
Hot Topics in High-Performance Computing: Networking and Fault Tolerance
Topics: Hot Topics in High Performance Parallel Computing: Networks and Fault Tolerance. Large-scale computer systems such as Petascale or upcoming Exascale machines pose significant challenges on the system and software designers. In this course, we will address to very important topics in this design: HPC networking and Fault Tolerance. The network will soon be the …
Permanent link to this article: https://www.darknessgate.com/2014/09/27/hot-topics-high-performance-computing-networking-fault-tolerance/