Cyber Security: Do you take the red pill or the blue pill?
In this project oriented class we take a hands-on approach to learning how hackers "hack" into systems, and then how to defend against attacks. Topics covered include password cracking, infecting machines with viruses, eavesdropping on network communication, and hiding data. Of course we also go through how to defend passwords by salting them, how to detect viruses with signatures, how to secure communications over a network, and how to detect hidden data.
This is a living document and not finalized (it may even change during the course). Every lecture is designed for a 2 hour timeslot, I generally split them into 45 minutes - 1 hour 15 minutes of lecturing and the rest is hands-on lab work. Here is a list of tools used during class.
All course materials and code are released under the MIT License. Please see the LICENSE file for more details.