2015-2016 2016-2017 2017-2018 2018-2019 2019-2020
Browse
by subject...
    Schedule
view...
 

1 - 2 of 2 results for: hack lab

INTLPOL 268: Hack Lab

(Formerly IPS 268) This course aims to give students a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Taught by a long-time cybersecurity practitioner, a recovering cyberlaw litigator, and a group of hearty, motivated TAs, each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past. Students will then complete a lab section, with the guidance of the instructor and assistants, where they attack a known insecure system using techniques and tools seen in the field. Each week, there will be a second lecture on the legal and policy impacts of the technologies and techniques we cover. By the end of the course, students are expected to have a basic understanding of some of the most common offensive techniques in use today as well as a comprehensive overview of the most important aspects of cyberpolicy and law. No computer science background is required. All students must have access to a Windows, Mac OS X or Linux laptop. Students must enroll in the lecture as well as one computer lab via Axess.
Terms: Aut | Units: 3 | Grading: Letter or Credit/No Credit

LAW 4049: Hack Lab

This course aims to give students a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Taught by a long-time cybersecurity practitioner, a recovering cyberlaw litigator, and a group of hearty, motivated TAs, each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past. Students will then complete a lab section, with the guidance of the instructor and assistants, where they attack a known insecure system using techniques and tools seen in the field. Each week, there will be a second lecture on the legal and policy impacts of the technologies and techniques we cover. By the end of the course, students are expected to have a basic understanding of some of the most common offensive techniques in use today as well as a comprehensive overview of the most important aspects of cyberpolicy and law. No computer science background is required. All students must have access to a Wi more »
This course aims to give students a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Taught by a long-time cybersecurity practitioner, a recovering cyberlaw litigator, and a group of hearty, motivated TAs, each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past. Students will then complete a lab section, with the guidance of the instructor and assistants, where they attack a known insecure system using techniques and tools seen in the field. Each week, there will be a second lecture on the legal and policy impacts of the technologies and techniques we cover. By the end of the course, students are expected to have a basic understanding of some of the most common offensive techniques in use today as well as a comprehensive overview of the most important aspects of cyberpolicy and law. No computer science background is required. All students must have access to a Windows, Mac OS X or Linux laptop. Students must enroll in the lecture as well as one Computer Lab via Axess. Special Instructions: This class is limited to 120 students with 30 spots for SLS students. If more than 30 SLS students wish to enroll, instructor permission is required. Elements used in grading: Class participation, written assignments, take-home midterm, and a final exam. Cross-listed with International Policy ( INTLPOL 268). Law students see INTLPOL listing for Computer Lab sections.
Terms: Aut | Units: 3 | Grading: Law Honors/Pass/Restrd Cr/Fail
Filter Results:
term offered
updating results...
number of units
updating results...
time offered
updating results...
days
updating results...
UG Requirements (GERs)
updating results...
component
updating results...
career
updating results...
© Stanford University | Terms of Use | Copyright Complaints