{"id":4,"date":"2025-06-04T19:51:30","date_gmt":"2025-06-04T19:51:30","guid":{"rendered":"https:\/\/courses.cs.colostate.edu\/cs003\/?page_id=4"},"modified":"2026-01-26T12:31:51","modified_gmt":"2026-01-26T19:31:51","slug":"cs-001","status":"publish","type":"page","link":"https:\/\/courses.cs.colostate.edu\/cs356\/","title":{"rendered":"CS-356 System Security"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">CS 356 System Security <\/h3>\n\n\n\n<p><strong>CS356 Systems Security<\/strong> presents a broad overview of cyber-security concepts, technologies and challenges. The course is open to computer science, advanced technology, mathematics, and engineering students. CS356 is a required course for all undergraduates in computer science. CS356 is also offered as an online course for distance-learning students (class section 801).<\/p>\n\n\n\n<p><strong>WARNING<\/strong>: During this course you will be learning about many different security tools and techniques, some of which can be used to circumvent or subvert network security measures. We will be using a safe and isolated networking environment to conduct ethical hacking experiments. Doing these experiments in our campus production environment will be grounds for failure in the class.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Description <\/h4>\n\n\n\n<p><em>Cyber-security<\/em> is a hot topic \u2013 every day new data breaches, malware, or hacking exploits impact critical systems. As a result, there is huge demand for computer science graduates trained in systems and network security. In this course you will learn cyber-security concepts and technology and how to write self-defensive software to protect your organization and yourself. This course will cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Computer security concepts<\/li>\n\n\n\n<li>Cryptographic tools<\/li>\n\n\n\n<li>User authentication &amp; access control<\/li>\n\n\n\n<li>Database security<\/li>\n\n\n\n<li>Malicious software<\/li>\n\n\n\n<li>Denial of service attacks<\/li>\n\n\n\n<li>Intrusion detection and prevention systems<\/li>\n\n\n\n<li>Buffer overflow attacks<\/li>\n\n\n\n<li>Internet authentication<\/li>\n\n\n\n<li>Wireless security<\/li>\n\n\n\n<li>Internet security protocols<\/li>\n\n\n\n<li>Privacy<\/li>\n<\/ul>\n\n\n\n<p>You will begin by learning basic cryptographic tools, then how hackers break into systems (\u201cthe dark side\u201d), and finally defensive programming techniques (\u201cdefense against the dark arts\u201d). Hands-on programming projects (ethical hacking, case studies, videos, current event discussion (cyber crime\/warfare\/terrorism), and demos (rob a bank, hack a database) will help you solidify and confidently apply your skills.<\/p>\n\n\n\n<p>Note: These web pages will remain mostly static. All lecture notes, assignments and projects will be posted on Canvas.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2025 Fall Semester Details<\/h4>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns wp-container-content-9cfa9a5a is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading\">Instructor(s)<\/h5>\n\n\n<style>.kb-table-container4_9ba4ca-32{overflow-x:auto;}.kb-table-container .kb-table4_9ba4ca-32 th{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:right;}.kb-table-container .kb-table4_9ba4ca-32 caption{text-align:center;}.kb-table-container .kb-table4_9ba4ca-32 td{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:left;}.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}@media all and (max-width: 1024px){.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}@media all and (max-width: 767px){.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}<\/style><div class=\"kb-table-container kb-table-container4_9ba4ca-32 wp-block-kadence-table\"><table class=\"kb-table kb-table4_9ba4ca-32\">\n<tr class=\"kb-table-row kb-table-row4_170755-54\">\n<td class=\"kb-table-data kb-table-data4_b4a01f-dc\">\n\n<p><strong>Instructor<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_1ab8d2-bb\">\n\n<p>Evan Anspach<\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_35a45a-77\">\n<td class=\"kb-table-data kb-table-data4_0fe0f0-db\">\n\n<p><strong>Office<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_418880-51\">\n\n<p>CSB 242<\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_a62e2b-c1\">\n<td class=\"kb-table-data kb-table-data4_bc694d-de\">\n\n<p><strong>Email<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_c0ba5e-78\">\n\n<p><a href=\"mailto:csDEV@cs.colostate.edu\">compsci_cs356@cs.colostate.edu<\/a><\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_3ad8c5-02\">\n<td class=\"kb-table-data kb-table-data4_3ff462-5a\">\n\n<p><strong>Office Hours<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_b37505-e5\">\n\n<p>T\/R 12pm-1:50pm<\/p>\n\n<\/td>\n<\/tr>\n<\/table><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading\">Class Schedule<\/h5>\n\n\n<style>.kb-table-container4_07f42a-d8{overflow-x:auto;}.kb-table-container .kb-table4_07f42a-d8 th{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:center;}.kb-table-container .kb-table4_07f42a-d8 caption{text-align:center;}.kb-table-container .kb-table4_07f42a-d8 td{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:left;}.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}@media all and (max-width: 1024px){.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}@media all and (max-width: 767px){.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}<\/style><div class=\"kb-table-container kb-table-container4_07f42a-d8 wp-block-kadence-table\"><table class=\"kb-table kb-table4_07f42a-d8\">\n<tr class=\"kb-table-row kb-table-row4_76cbba-eb\">\n<th class=\"kb-table-data kb-table-data4_fb9170-a7\">\n\n<p>Section<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_7b09a2-a3\">\n\n<p>Schedule<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_d89863-cf\">\n\n<p>Location<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_c4f2e9-0d\">\n\n<p>Instructor<\/p>\n\n<\/th>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_6ae12b-bf\">\n<td class=\"kb-table-data kb-table-data4_c1bdbe-df\">\n\n<p>001<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_3dbf82-79\">\n\n<p>TuTh 2-3:15 pm<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_130cee-fd\">\n\n<p>Chemsity A 103<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_983ccf-64\">\n\n<p>Evan Anspach<\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_ae92b0-fd\">\n<td class=\"kb-table-data kb-table-data4_94fc11-da\">\n\n<p>801<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_ca401b-2a\">\n\n<p>Async<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_3b1e40-2f\">\n\n<p>Online<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_521d86-ef\">\n\n<p>Evan Anspach<\/p>\n\n<\/td>\n<\/tr>\n<\/table><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns wp-container-content-9cfa9a5a is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading\" id=\"TAs\">TA Information<\/h5>\n\n\n<style>.kb-table-container4_821fc4-ff{overflow-x:auto;}.kb-table-container .kb-table4_821fc4-ff th{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:center;}.kb-table-container .kb-table4_821fc4-ff caption{text-align:center;}.kb-table-container .kb-table4_821fc4-ff td{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:left;}.kb-table-container .kb-table4_821fc4-ff tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}@media all and (max-width: 1024px){.kb-table-container .kb-table4_821fc4-ff tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}@media all and (max-width: 767px){.kb-table-container .kb-table4_821fc4-ff tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}<\/style><div class=\"kb-table-container kb-table-container4_821fc4-ff wp-block-kadence-table\"><table class=\"kb-table kb-table4_821fc4-ff\">\n<tr class=\"kb-table-row kb-table-row4_e22a94-32\">\n<th class=\"kb-table-data kb-table-data4_254192-f9\">\n\n<p>Name<\/p>\n\n\n\n<p>Asif Uz Zaman<\/p>\n\n\n\n<p>MD Al Amin<\/p>\n\n\n\n<p>Cesar Oros Olivas<\/p>\n\n\n\n<p>Conor Holland<\/p>\n\n\n\n<p>Trevor Venable<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_29769e-1b\">\n\n<p>Role<\/p>\n\n\n\n<p>GTA<\/p>\n\n\n\n<p>GTA<\/p>\n\n\n\n<p>UTA<\/p>\n\n\n\n<p>UTA<\/p>\n\n\n\n<p>UTA<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_f9379e-35\">\n\n<p>Initials<\/p>\n\n<\/th>\n<\/tr>\n<\/table><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CS 356 System Security CS356 Systems Security presents a broad overview of cyber-security concepts, technologies and challenges. The course is open to computer science, advanced technology, mathematics, and engineering students. CS356 is a required course for all undergraduates in computer science. CS356 is also offered as an online course for distance-learning students (class section 801). [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-no-page-title.php","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry","post-preview"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"admin","author_link":"https:\/\/courses.cs.colostate.edu\/cs356\/author\/admin_41g0qmxe\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":18,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":94,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/4\/revisions\/94"}],"wp:attachment":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}