Course Overview

Computer and Network Security (3 semester hours) is a comprehensive study of the security principles and practices of computer and network systems. Topics include fundamental concepts and principles of computer security, operating system and network security, firewalls and intrusion detection systems, secret key and public key cryptographic algorithms, hash functions, authentication, SSL and Web security.

The learning outcome is students shall be able to understand the basic principles and practices in computer and network security. In particular, understand what the foundational theory is behind computer security, what the common threats are (e.g., malware, exploit, vulnerability), and how to build the defense mechanism in a combination from OS, network and applied crypto.

In support of this, the course will prepare students to do basic system, network, and application-level programming/labs related to security purposes.

Course Syllabus

PART ONE: Starting from threat

PART TWO: Operating System and Software Security

PART THREE: Basic Cryptography

PART FOUR: Network Security

NOTE: please access all the lecture notes posted in e-learning.

Text Books

Required textbooks

Reference textbooks

Office Hours

Monday, Wednesday 11:30AM - 12:30PM


Course Projects

Course Policy

Grading Policy

Late Policy

All late submissions will automatically lose 10 points per delayed day.

Collaboration Policy

Students are encouraged to collaborate, particularly on the discussion on the course project. However, each individual must finish the project by him/her-self.

Cheating Policy

We will strictly follow the university policy on cheating and plagiarism which is available here. Please avoid. There are also several examples of Scholastic Dishonesty If you have any questions regarding this issue, please contact the instructor.


The course materials have incorporated those developed by Dr. Matt Bishop (UC Davis), Dr. David Brumley (CMU), Dr. Wenliang Du (Syracuse), Dr. Nick Feamster (Georgia Tech), Dr. Guofei Gu (TAMU), Dr. Wenke Lee (Georgia Tech), Dr. Ninghui Li (Purdue), Dr. Peng Ning (NCSU), and Dr. Vitaly Shmatikov (UT Austin). The copyright of these materials belongs to them.