EC 310: Applications of Cyber Engineering (2-2-3)
Course Description
The second of a two-course sequence in cyber security, EC310 provides students with a solid foundation in computer and network operations and vulnerabilities, and the means to protect mission-critical systems. Prerequisites: SI110 and 2/C standing.
Schedule
Note: PDF documents render best using Google Chrome
Week |
Topic |
Lecture
|
Lab |
Homework |
Aug 19 |
Host: Number Systems |
Lecture 1 |
Lab 1 |
Homework 1 * |
Host: C Programming |
Lecture 2 |
Lab 2 |
Homework 2 * |
|
Aug 26 |
Host: Registers and Memory |
Lecture 3 |
Lab 3 |
Homework 3 * |
Host: Arrays and Strings |
Lecture 4 |
Lab 4 |
Homework 4 * |
|
Sep 2 |
N/A |
N/A |
N/A |
N/A |
Host: Pointers |
Lecture 5 |
Lab 5 |
Homework 5 * |
|
Sep 9 |
Host: The Stack |
Lecture 6 |
Lab 6 |
Homework 6 * |
Host: Buffer Overflow |
Lecture 7 |
Lab 7 |
Homework 7 * |
|
Sep 16 |
Host: Files |
Lecture 8 |
Lab 8 |
Homework 8 * |
Host: Privilege Management |
Lecture 9 |
Lab 9 |
Homework 9 * |
|
Sep 23 |
Catch up! |
Catch up! |
Catch up! |
None |
Host: Stack Smashing |
Lecture 10 |
Lab 10 |
None |
|
Sep 30 |
Network: TCP/IP Model |
Lecture 11 |
N/A |
Homework 11 |
Network: IP |
Lecture 12 |
Lab 12 |
Homework 12 |
|
Oct 7 |
Network: Ethernet |
Lecture 13 |
Lab 13 |
Homework 13 |
Network: Subnets |
Lecture 14 |
Lab 14 |
Homework 14 |
|
Oct 14 |
Network: Routing |
Lecture 15 |
Lab 15 |
Homework 15 |
Lecture 16 |
Lab 16 |
Homework 16 |
||
Oct 21 |
Lecture 17 |
Lab 17 |
Homework 17 |
|
Lecture 18 |
Lab 18 |
Homework 18 |
||
Oct 28 |
Lecture 19 |
Lab 19 |
None (study!) |
|
Lecture 20 |
EXAM 2 |
Homework 20 |
||
Nov 4 |
Lecture 21 |
Lab 21 |
Homework 21 |
|
Lecture 22 |
Lab 22 |
Homework 22 |
||
Nov 11 |
Lecture 23 |
Lab 23 |
Homework 23 |
|
Lecture 24 |
Lab 24 |
Homework 24 |
||
Nov 18 |
Lecture 25 |
Lab 25 |
Homework 25 |
|
Lecture 26 |
Lab 26 |
Homework 26 |
||
Nov 25 |
Lecture 27 |
Lab 27 |
None (eat!) |
|
Thanksgiving Break |
||||
Dec 2 |
Lecture 28 |
Lab 28 |
Homework 28 |
|
N/A |
N/A |
|||