Introduction

information

Disclaimer: I will keep my notes until I adjust to this course.

For COMP 2633: Competitive Programming in Cybersecurity I

Course information

  • Course code: COMP 2633
  • Course title: Competitive Programming in Cybersecurity I
  • Semester: 24/25 Fall
  • Credit: 0
  • Grade: P/F
  • TMI
    • exclusion: COMP 3633, COMP 4633
    • previous code: COMP 4901N
Description

Cyber-attacks mounted by malicious attackers have been creating significant damage to various companies and individuals around the globe in the recent years; cybersecurity is now a high priority consideration for the major businesses worldwide. To deepen the practical knowledge in fighting against the cybersecurity threats, cybersecurity competitions are being organized every year by various institutions and organizations. This course prepares interested students with the practical knowledge for taking part in cybersecurity contests. The course will be offered as a 0-credit course in the Fall semester. Enrolled students will learn the common topics in the first 5 weeks of the Fall, getting trained in fundamental knowledge of cybersecurity. Then they will divide into two tracks in the remainder of the Fall. One track will be concentrating on topics like binary analysis, reverse engineering, the other track will be concentrating on topics like web exploitation, cryptography, computer forensics, and other miscellaneous topics. Graded P or F.

Description (brief)
  • The course consists of 4 hours of class per week. Unpon successfully completion, it will give you 0 credit, and the course name Competitive programming in Cybersecurity I will be shown on your transcript.
ILOs
  • Be able to apply and understand ethical hacking.
  • Be able to master the basic knowledge required for dealing with cybersecurity threats.
  • Be able to learn the more advanced knowledge for dealing with cybersecurity threats.
  • Be familiar with real-world issues related to cybersecurity in various organizations.
  • Be familiar with the practical skills in fighting against cybersecurity threats.

My section

  • Section: LA1
  • Time: Fr 06:00PM - 09:50PM
  • Venue: Rm 4210, Lift 19 (de facto: Zoom)
  • Instructor: Firebird core members, and Dr. Alex Ngok Lam

Grading scheme

Assessment TaskPercentage
Class attendance50%
In-class / take home exercises (track A/ track B)50%

To get a pass, you will need to get at least 60% of the total scores. Getting a pass is not enough to be invited to join the contests (through COMP3633), you need to do much better than that in order to join the contests (through COMP3633)! Please check your own grades from the CANVAS system.

Bonus scheme
  • Objective: Encourage students to further explore beyond the track he/she has chosen
  • Meaning: When you have completed a work in track A or track B, you will get the corresponding points
  • Bonus scheme: This motivates hard-working students without sacrificing the less hard-working students
  • Examples:
    • If a student attended all the 12 classes, and he/she gets 75% for all the works of track A, he/she will get (12/12)50%+0.7550%=87.5%
    • If a student attended all the 12 classes and he/she gets 40% for the works of track A, yet he/she also attempts the works of track B and got 50% for the work of track B, he/she will get (12/12)50%+0.450%+0.5*50%=95%
    • theoretically speaking a student could get upto 150% if he/she has done perfectly all the works of track A and track B.

Optional resources

  • Linux Basics for Hackers : Getting Started with Networking, Scripting, and Security in Kali
    • ISBN: 978-1593278557
  • An introduction to mathematical cryptography 2nd edition
    • ISBN: 978-1493917105
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
    • ISBN: 978-1593272906
  • Web Security for Developers
    • ISBN: 978-1593279943
  • Cryptography and Network Security: Principles and Practice, 7th edition
    • ISBN: 978-0134444284
  • Computer Security: Principles and Practice, 4th edition
    • ISBN: 978-0135137116