Search results: 1882
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
- Teacher: Mary Agoyi
- Teacher: Mustafa Cagatayli
This course covers both the fundamentals and advanced topics in operating system (OS) security. Access control mechanisms (e.g., SACL/DACL), memory protections, and interprocess communications mechanisms will be studied. Students will learn the current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks. In addition, advanced persistent threats, including rootkits and malware, as well as various protection mechanisms designed to thwart these types of malicious activities, will be studied. Advanced kernel debugging techniques will be applied to understand the underlying protection mechanisms and analyze the malicious software. Students will learn both hardware and software mechanisms designed to protect the OS (e.g., NX/ASLR/SMEP/SMAP).
This course discusses different types of malicious attacks and various methods of mitigating to them. Students learn how to protect computer networks by using security codes. Topics covered includes foundations of network security, IP packet structure and analysis control, routing and access control lists, attack techniques, network defense fundamentals, sign-on solutions and file encryption solutions. At the end, the course students will be able to understand the security problems introduced by the combination of the Internet with Intranets, mobile devices, and sensors networks. Students will also be able to develop a basic understanding of the theoretical and conceptual aspects that are needed to build secure systems.
Üniversitenin kalite çalışmaları kapsamında kullanılacak olan dokümanları ve bilgilendirmeleri içerir.