This course presents case studies of the design of various security pro- tocols including SSL, WEP / WPA, IPSec, and Kerberos. We focus on discussing the pros and cons of various security trade-offs involved in the design of such protocols, and we describe vulnerabilities that some of these protocols are susceptible to due to design flaws.
The course aims at equipping students with systematic approaches of analysis, designing and implementing security mechanisms in organi- zations so as to minimize the vernulability of organization ICT infras- tructure from malicious attacks.