Welcome to Information Security
Information security is a critical aspect of modern computing, dealing with safeguarding sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
In today’s digital age, the exponential increase in data volume and value stored across computer networks makes understanding information security principles, tools, and techniques essential for computer scientists.
Key Areas of Study
The field of information security encompasses several important domains:
- Cryptography: Creating secure communication channels through encryption, decryption, and digital signatures
- Access Control: Managing who has access to resources and under what conditions
- Network Security: Protecting computer networks from attacks, viruses, and malware
- Software Security: Developing applications resistant to security threats
- Data Security: Protecting sensitive information from unauthorized access, use, disclosure, modification, or destruction
-
Incident Response: Detecting, investigating, and mitigating security breaches
Skills You’ll Develop
To succeed in information security, you’ll need:
✓ Technical Foundation: Solid understanding of computer systems and networks
✓ Current Knowledge: Familiarity with latest security technologies and best practices
✓ Analytical Skills: Ability to solve complex security problems
✓ Ethical Awareness: Understanding of privacy, data protection laws, and professional responsibility
Before You Begin
NEW STUDENT?
Start Here: Complete the Quick Start Guide for essential first steps and setup.
Essential Resources
- Quick Start Guide - Essential first steps and requirements
- Prerequisites - Project preparation requirements
- Syllabus - Course policies and grading
Our Approach: Project-Based Learning
This course introduces you to information security through Project-Based Learning—a hands-on approach that goes beyond traditional lectures and memorization.
Why Project-Based Learning?
- Deep Understanding: Projects provide comprehensive exploration of security technologies
- Practical Skills: Build confidence to tackle real-world security challenges
- Applied Knowledge: Learn by doing rather than just reading
Current Projects
Complete all projects from our comprehensive portfolio:
| Project Name | VM Required | Prerequisites |
|---|---|---|
| Man in the Middle | No | Prerequisites |
| Machine Learning | No | Prerequisites |
| Binary Exploitation | Yes | Prerequisites |
| API Security | Yes | Prerequisites |
| Web Security | Yes | Prerequisites |
| Log4Shell | Yes | Prerequisites |
| Malware Analysis | Yes | Prerequisites |
| RSA Cryptography | No | Prerequisites |
| Database Security | Yes | Prerequisites |
Note: Projects marked “VM Required” need a virtual machine setup. Check the Quick Start Guide for system requirements.
🔗 Quick Navigation
Getting Started
- Quick Start Guide - Essential first steps and requirements
- Schedule - Assignment due dates
Policies & Support
- Academic Honesty - Zero tolerance policies
- Communication Policies - How to get help
- Submissions & Gradescope - Assignment submission procedures