CS 6265: Information Security Lab

Instructional Team

Taesoo Kim

Taesoo Kim
Instructor
Seulbae Kim

Seulbae Kim
Head TA

Overview

This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) and discussing strategies for solving such problems. This course covers a variety of topics including (but not limited to) reverse engineering, exploitation, binary analysis, and web.

More information is available on the CS 6265 course website.

This course does not count toward any specific specialization, and does not count as a foundational course.

Course Goals

Students will learn:

  • Classes of security vulnerabilities
  • How to exploit security vulnerabilities
  • How to defend or mitigate security vulnerabilities

Preview

Sample Syllabi

Spring 2020 syllabus and schedule (PDF)
Fall 2019 Syllabus

Note: Sample syllabi are provided for informational purposes only. For the most up-to-date information, consult the official course documentation.

Before Taking This Class...

Suggested Background Knowledge

Operating systems or equivalent (e.g., CS 3210 at GT).

Technical Requirements and Software

Academic Integrity

All Georgia Tech students are expected to uphold the Georgia Tech Academic Honor Code. This course may impose additional academic integrity stipulations; consult the official course documentation for more information.