On successful completion of the course, the student should be able to:
a. Understand security mechanisms in modern computer systems, its role, and its importance;
b. Understand techniques for implementing security policies;
c. Use and operate access-control mechanisms;
d. Understand vulnerabilities associated with computer systems, and how they can be mitigated.
This course introduces computer security mechanisms at an elementary level.
1. Concepts and Terminology: security; confidentiality, integrity and availability; security policies; security models; mandatory and discretionary access control; access control matrix, capabilities and access control lists; information flow;
2. Security Models: information flow policies; role-based access control
3. Implementation of Mechanisms: security mechanisms in hardware and operating systems; memory management, memory protection and logical protection; access control lists
4. User authentication: passwords, biometrics and user tokens; identity management
5. Case Studies: Intel processor family; Windows; Unix
6. Operating system vulnerabilities: how they can be exploited and how they can be prevented
7. Software security: buffer overflows and exploits; validation.
|Who Should Attend|
Working professionals with prior knowledge of Computing and Algorithms, Data Structures and Operating systems. Or have read CZ2005 Operating Systems previously.
Pre-requisite: CZ2005 Operating Systems
|Date(s):||13 Aug 2018 to 07 Dec 2018|
|Time:||Refer to Class and Exam Schedules|
|Venue:||NTU Main Campus|
|Closing Date of Registration:||17 Jun 2018|
Full Course Fee :
Singapore Citizen /Singapore PR1 21 to 39 years old :
Singapore Citizen1 40 years or older2 :
Singapore Citizen1 Eligible for WTS3 :
Singapore PRs ≥ 21 years older
Enhanced Training Support for SMEs4 :
|Method of Payment|
|Withdrawal & Refund Policy|
|Once payment is made, applicant is committed to the completion of course. Course fee refunds will not be considered.|
|Terms and Conditions|
|At PaCE College, participants’ personal information is collected, used and disclosed for the following purposes: