The following is a list of courses I’ve taught at Northeastern.
Software Vulnerabilities and Security is a graduate course covering common software programming, configuration, and design mistakes, and how to avoid them. The goals of the course are the following:
Examples of topics covered by this course include:
CS3740 is an undergraduate introduction to the principles of computer security. The goals of the course are the following:
This course offers opportunities for hands-on practice of real-world attack and defense in several domains, including systems administration, the Web, and mobile devices.
CS4740/6740 is a mixed undergraduate and graduate-level course on network security covering a diverse range of topics at all layers of the networking stack, from physical to application-level security. The course focuses on the intersection between systems security principles and networking, from abstract models to their application in systems code, the Web, and mobile platforms. There is a pronounced emphasis on practical techniques for both defending and attacking systems in support of the high-level goal to impart the “attacker’s mindset.”
CS7780 is a graduate level course on malicious software, or malware. In this course, we will examine malware both through the lens of recent academic literature as well as through practical research projects. The aim is to explore how malware manifests in systems-level code, on the Web, and in mobile devices, and to discuss approaches to dealing with malware in each of these settings. Representative topics of discussion include those from the following non-exhaustive list.
The format of the classes will be biased towards interactive discussion, with little emphasis on lectures. Students should come to class prepared to discuss the week’s readings and assignments.
EECE7398 is a special topics course on network and systems security, providing a broad overview of a diverse range of topics across these two domains. The course builds from foundational security models and principles to examine attacks and defenses in systems code, the Web, and mobile platforms. There is a pronounced emphasis on practical techniques in support of the high-level goal to impart the “attacker’s mindset.”