The goal of this course is to provide students with enough Unix to allow them to work productively in CS courses at the 300 level and beyond. Particular emphasis is placed on Unix tools and procedures that support the kind of programming students will face in assignments in those later courses. Because relatively few people …
Tag: Linux OS
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unix-programmers/
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unixlinux/
Introduction to UNIX
These lecture notes and exercises are designed to support an intensive introductory course on UNIX or to act as a reference to users who are new to UNIX. This course was designed particularly for use with the Linux operating system but much of it applies to other UNIX systems as well. These notes are also …
Permanent link to this article: https://www.darknessgate.com/2014/09/28/introduction-unix/
Linux Administration study materials
This course provides an introduction to Linux administration. Topics include installation, configuration, mounting drives, user and group administration, file system administration and management, process control, and network and computer security concepts and tools. Video tutorials and Free Text book (PDF) from Daytona State College Course Outcomes By the end of this course the successful student …
Permanent link to this article: https://www.darknessgate.com/2014/09/16/linux-administration-study-materials/
CS 290G: Secure Computation (Spring 2014)
Course Description With the growing demand for security and privacy, the field of cryptography has expanded rapidly in the past three decades. Beyond the original goal of ensuring secure communication, innovative and powerful concepts and primitives have emerged that enable new secure paradigm of computing. In this course, we will survey some of the exciting …
Permanent link to this article: https://www.darknessgate.com/2014/09/15/cs-290g-secure-computation-spring-2014/
Security Protocols (Advanced Topics in Cryptology)
This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them. Course Outline Basics in cryptology – cryptosystems, digital signatures, (keyed) …
Permanent link to this article: https://www.darknessgate.com/2014/09/10/security-protocols-advanced-topics-cryptology/
TSIT03 Cryptology 2013
The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …
Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/
Course F21CN: Computer Network Security
The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …
Permanent link to this article: https://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/
Cryptography and Computer Security (CCS)
This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. Course goal is introduction to algorithms and fundamentals of security protocols and technics. The …
Permanent link to this article: https://www.darknessgate.com/2014/09/06/cryptography-computer-security-ccs/
Introduction to Computer Security, Spring 2014
Course Objectives: Ever since the first worm, Morris Worm, released through the Internet in 1988, the attack-defense game between hackers and administrators never ends. To better protect our ICT (Information and Communications Technology) systems, we need to understand first what hacking techniques have been developed over the years and then see their countermeasures. This course …
Permanent link to this article: https://www.darknessgate.com/2014/09/03/introduction-computer-security-spring-2014/
Theory and Practice of Cryptography Mini-Course
This mini-course was taught in 2007 at Google. It is intended to be a brief survey for a general technical audience. Video Lectures Classical to Modern Cryptography Using Cryptography in Practice Security Definitions and Proofs of Security Verifying Elections with Cryptography. Guest Lecturer: Ben Adida. Crypto Strikes Back! by Nate Lawson, with blog post and …
Permanent link to this article: https://www.darknessgate.com/2014/09/02/theory-practice-cryptography-mini-course/