CS 6265: Information Security Lab

Instructional Team

Taesoo Kim

Taesoo Kim
Instructor
Seulbae Kim

Mingyi Liu
Head TA

Overview

This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) and discussing strategies for solving such problems. This course covers a variety of topics including (but not limited to) reverse engineering, exploitation, binary analysis, and web.

More information is available on the CS 6265 course website.

This course does not count toward any specific specialization, and does not count as a foundational course.

Course Goals

Students will learn:

  • Classes of security vulnerabilities
  • How to exploit security vulnerabilities
  • How to defend or mitigate security vulnerabilities

Preview

Sample Syllabi

Fall 2020 syllabus and schedule (PDF)
Summer 2020 syllabus and schedule (PDF)
Spring 2020 syllabus and schedule (PDF)

Note: Sample syllabi are provided for informational purposes only. For the most up-to-date information, consult the official course documentation.

Before Taking This Class...

Suggested Background Knowledge

Operating systems or equivalent (e.g., CS 3210 at GT).

Technical Requirements and Software

Academic Integrity

All Georgia Tech students are expected to uphold the Georgia Tech Academic Honor Code. This course may impose additional academic integrity stipulations; consult the official course documentation for more information.