The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
George Mason University
    George Mason University
   
 
 
 
2016-2017 University Catalog 
  
2016-2017 University Catalog

ISA 764 - Security Experimentation

Credits: 3
Not Repeatable for Credit
Offered by Computer Science  
Teaches how to conduct security experimentations and empirically demonstrate, validate, and evaluate security vulnerabilities, exploits, and defense mechanisms. By the end of the course, students will gain a deeper understanding and first-hand experience on capturing packets of interests from both wired and wireless networks, and replying interested network flows and how shellcode various buffer overflows attacks, worms, spyware, rootkits, botnets, anonymous communication and traceback mechanisms work.

Prerequisite(s): B- or higher in ISA 564 and ISA 656.
Prerequisite(s) enforced by registration system.

Schedule Type: LEC
Hours of Lecture or Seminar per week: 3
Hours of Lab or Studio per week: 0