CS 6265: Information Security Lab
Instructional Team
Taesoo Kim
Instructor
Mingyi Liu
Head TA
Overview
This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) and discussing strategies for solving such problems. This course covers a variety of topics including (but not limited to) reverse engineering, exploitation, binary analysis, and web.
This course is not foundational and does not count toward any specializations at present, but it can be counted as a free elective.
Course Goals
Students will learn:
- Classes of security vulnerabilities
- How to exploit security vulnerabilities
- How to defend or mitigate security vulnerabilities
Preview
Sample Syllabi
Summer 2024 syllabus (PDF)
Summer 2023 syllabus (PDF)
Summer 2022 syllabus (PDF)
Note: Sample syllabi are provided for informational purposes only. For the most up-to-date information, consult the official course documentation.
Before Taking This Class...
Suggested Background Knowledge
Operating systems or equivalent (e.g., CS 3210 at GT).
Technical Requirements and Software
- Internet connection (DSL, LAN, or cable connection desirable)
- Adobe Acrobat PDF reader (free download; see https://get.adobe.com/reader/)
Academic Integrity
All Georgia Tech students are expected to uphold the Georgia Tech Academic Honor Code. This course may impose additional academic integrity stipulations; consult the official course documentation for more information.