CSEC 640 * We aren't endorsed by this school

CSEC 640

  • Average Course Rating (from 2 Students)

    4.5/5
    Overall Rating Breakdown
    • 2 Advice
    • 5
      50%
    • 4
      50%
    • 3
      0%
    • 2
      0%
    • 1
      0%
  • Course Difficulty Rating

    • Easy 0%

    • Medium 50%

    • Hard 50%

  • Top Course Tags

    A Few Big Assignments

    Background Knowledge Expected

    Group Projects

* We aren't endorsed by this school

CSEC 640 Questions & Answers

CSEC 640 Flashcards

CSEC 640 Advice

CSEC 640 Documents

Showing 1 to 30 of 157

Sort by:
{[$select.selected.label]}

Recent Documents


CSEC 640 Questions & Answers


CSEC 640 Advice

Showing 1 to 2 of 2

View all
    • Profile picture
    Apr 05, 2017
    | Would highly recommend.

    Not too easy. Not too difficult.

    Course Overview:

    Terrific course with a lot of great material to learn in setting up effective defenses against cyber attacks

    Course highlights:

    things introduced in this course range from penetration testing to strengths and weakness from different types of cyber attacks such as DoS /DDos attacks and more

    Hours per week:

    9-11 hours

    Advice for students:

    Please be diligent and on top of all of your assignments and readings. It is vital in order to be successful.

    • Spring 2017
    • Michael Nance
    • Yes
    • Background Knowledge Expected A Few Big Assignments Group Projects
    • Profile picture
    Aug 07, 2016
    | Would recommend.

    This class was tough.

    Course Overview:

    In the CSEC degree program, this is one of the first courses to really get into the technical details on Cyber issues. Assignments get into the different methods of attacking and defending aspects of networks, instead of just 'good policy' or how they work. The class doesn't teach ways to program in these tools, but it leads you to both understand them and to see when they would best be used

    Course highlights:

    Personally, the top item that I learned was the De-authentication attack that can be employed on users of wireless networks, to include WPA2. While WPS attacks are pretty easy, getting into WPA and WPA2 have been relatively secure until these methods. Other highlights include ARP poisoning examples, and countless Man in the Middle (MitM) attack methods

    Hours per week:

    9-11 hours

    Advice for students:

    Have a strong working knowledge of network setup, of basic security protocols, as well as commonly available tools in the Cyber community (such as WIreshark and nMap). The books aren't needed, but they really lay out the concepts in a technical yet approachable method.

    • Spring 2016
    • Jun-Jang
    • Yes
    • Lots of Writing Many Small Assignments Requires Lots of Research

Ask a homework question - tutors are online