Skip to main content

CS 466 Syllabus

Information Security I

Revised: Oct 2023

Course Description

This course will focus on cryptography; confidentiality, integrity, and availability; authentication, authorization, and accountability; access control; concepts of risk, threats, and vulnerabilities; attacks; disaster recovery, backup; and defensive programming.


Prerequisites and Notes

    • Completion of, or concurrent enrollment in CS 465.
    • 3 Credit hours


Mark Rhodes-Ousley, Information Security, Second Edition, McGraw Hill, 2013

Grading Procedure

Grading procedures and factors influencing course grade are left to the discretion of individual instructors, subject to general university policy.

Attendance Policy

Attendance policy is left to the discretion of individual instructors, subject to general University policy.

Course Outline

A Sampling of course topics include:

  • Security policies
  • CIA (Confidentiality, Integrity, Authority)
  • AAA(Authentication, Authorization, Accounting)
  • Basic types of threats
  • Stream and block ciphers
  • Symmetric and Asymmetric algorithms
  • Discretionary control mechanisms
  • Risks, threats, and vilnerabilities
  • DOS attacks
  • spoofing
  • session hijacking
  • botnets, viruses, trojans
  • worms and backdoor attacks
  • brute force and dictionary attacks
  • secure application and writing secure software
  • secure development lifecycle
  • SQL injection
  • buffer overflow, injection vulnerabilities
  • input validation and data sanitization


Office of Web Services