CS 6265: Information Security Lab

Instructional Team

Taesoo Kim
Taesoo Kim
Instructor
Mingyi Liu
Mingyi Liu
Head TA

Overview

This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) and discussing strategies for solving such problems. This course covers a variety of topics including (but not limited to) reverse engineering, exploitation, binary analysis, and web.

This course is not foundational and does not count toward any specializations at present, but it can be counted as a free elective.

Course Goals

Students will learn:

  • Classes of security vulnerabilities
  • How to exploit security vulnerabilities
  • How to defend or mitigate security vulnerabilities

Preview

Sample Syllabi

Spring 2025 syllabus (PDF)
Summer 2024 syllabus (PDF)
Summer 2023 syllabus (PDF)

Note: Sample syllabi are provided for informational purposes only. For the most up-to-date information, consult the official course documentation.

Before Taking This Class...

Suggested Background Knowledge

Operating systems or equivalent (e.g., CS 3210 at GT).

Technical Requirements and Software

Academic Integrity

All Georgia Tech students are expected to uphold the Georgia Tech Academic Honor Code. This course may impose additional academic integrity stipulations; consult the official course documentation for more information.