This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) and discussing strategies for solving such problems. This course covers a variety of topics including (but not limited to) reverse engineering, exploitation, binary analysis, and web.
More information is available on the CS 6265 course website.
This course does not count toward any specific specialization, and does not count as a foundational course.
Students will learn:
- Classes of security vulnerabilities
- How to exploit security vulnerabilities
- How to defend or mitigate security vulnerabilities
Note: Sample syllabi are provided for informational purposes only. For the most up-to-date information, consult the official course documentation.
Before Taking This Class...
Suggested Background Knowledge
Operating systems or equivalent (e.g., CS 3210 at GT).
Technical Requirements and Software
- Internet connection (DSL, LAN, or cable connection desirable)
- Adobe Acrobat PDF reader (free download; see https://get.adobe.com/reader/)
All Georgia Tech students are expected to uphold the Georgia Tech Academic Honor Code. This course may impose additional academic integrity stipulations; consult the official course documentation for more information.