ECE: Electrical & Computer Engineering

ECE 5585 Information Technology Security and Trust


Spring 2014 textbook list

The Spring 2014 ECE textbook list is available online for students.

Current Prerequisites & Course Offering

For current prerequisites for a particular course, and to view course offerings for a particular semester, see the Virginia Tech Course Timetables.

Return to course list

ECE 5585 Information Technology Security and Trust (3C)

Fundamental Internet and computer security principles and applications; legal and privacy issues, risk analysis, attack tecniques, intrusion detection concepts, basic computer forensics, and system and application security hardening techniques. MIT Students Only (Master of Information Technology).

What is the reason for this course?

This class teaches Masters of Information Technology (MIT) students how to properly test computer systems, networks or applications for compliance with the laws, regulations, and policies enacted local, state, and federal governments. The requisite knowledge of these fundamental security concepts provides the student with the necessary background to enhance their academic and practical knowledge. The sequence also provdes the advanced trustworthy network concept required to be able to synthesize elements from networking, security, privacy and trust concepts, protocols and technology to affect defense-in-depth in modern computing and network systems, and to engineer and evaluate relevant security and trust solutions.

Typically offered: Fall. Program Area: Computers.

Prerequisites: Graduate Standing.

Department Syllabus Information:

Major Measurable Learning Objectives:
  • Idendify the legal, privacy, and ethical aspects of computer security.
  • Analyze techniques used by hackers to penetrate systems and networks.
  • Analyze systems and software applications for security vulnerabilities and recommend corrective measures.
  • Identify common network and system attacks and devise plans to eliminate problems.
  • Explain core security issues related to wired/wireless networks.
  • Evaluate basic encryption techniques and specify appropriate security practices for specific situations.

Course Topics
Topic Percentage
1. Legal and ethical aspects of computer security 15%
2. Risk analysis 10%
3. User authentication 10%
4. Introduction to network security standards 10%
5. Cryptography and its role in computer security 10%
6. Software application security 15%
7. Penetration study methodologies 15%
8. Instrusion detection techniques 15%

Return to course list