Course Code: IEDS 3525
Academic Year: 2025-2026
Students learn to analyze various methods and approaches that intruders use to compromise integrity of data and information in storage and computing systems. Students study network and internet protocols, TCP/IP protocol suite used for communication systems to bring along various malware and viruses on the computing system with malicious intent. Students explore a number of applications and tools to monitor and circumvent the intrusion attempts. Students learn to design secure system at different layers to counter intrusion attempts, exploring various authentication models and architectures.