Current Catalog Description

Overview of network security threats and vulnerabilities. Techniques and tools for detecting, responding to and recovering from security incidents. Fundamentals of cryptography. Hands-on experience with programming techniques for security protocols. Credit will not be given for both CSE 343 and CSE 443. Prerequisite: (CSE 202 or ECE 201) or CSE 271

Instructor: Mooi Choo Chuah (Spring 2021)

Textbook (recommended):

 Wenliang Du, "Computer Security: A Hands-on Approach", 2nd Edition,  2019, ISBN 978-1733003908



  1. Ability to explain the significance of current research about network security


CSE 343 substantially supports the following student enabled characteristics:

1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.

Major Topics Covered in the Course

  • Network vulnerabilities such as TCP ssession hijacks
  • Footprinting & Networking enumeration
  • Software vulnerabilities such as buffer overflows, return to libc attack
  • Distributed denial of service attacks and mitigations
  • Web security
  • Worm modeling and detection
  • Firewall
  • Mobile security
  • Cloud Security
  • WLAN security

Assessment Plan for the Course

The students are given five medium/long lab assignments, each assignment may consist of multiple parts reinforcing the material that has been covered in lectures. There are 2 mid-terms. The 1st midterm is a traditional midterm where students are assessed their understanding of topics covered in the 1st few weeks of class: basics of TCP/IP, software vulnerabilities, web vulnerabilities, DDOS/worm modeling topics. The 2nd midterm, students form different groups to tackle two different topics: IoT security and cloud security. They give a group presentations on one of the two papers related to the two topics and write an individual summary of the papers their group presents. The final examination is a War Game where members in each group divide their responsibilities in installing web services, designing defense strategies for their machines and research on offensive strategies against others' machines. They have to give a group presentation and submit a final War Game report.

How Data in the Course are Used to Assess Program Outcomes: (unless adequately covered already in the assessment discussion under Criterion 4)

Each semester, the instructor includes the above data from the assessment plan in the self-assessment report of the course and this report is reviewed in turn by the Curriculum Committee.