Franklyn Turbak (call me "Lyn")
Office: SCI E126 (x3049)
Email: fturbak asperand hillary-clinton-alma-mater dot edu
Lectures: Mon/Thu 9:50--11:00am in SCI 392. Please bring a laptop to lecture if you have one, since we will often do hands-on exercises in class.
Labs: You need to attend one of the following three weekly labs (all held in SCI 160A):
- Tue 9:50-11am
- Tue 11:10am-12:20pm
- Wed 2:15-3:25pm
- a burning desire to learn about computer security;
- a willingness to learn a lot of new conceptsa and systems independently and with your peers;
- a can-do, never-give-up attitude;
Course Website: All handouts, slides, readings, etc. are posted on the course website at
Course Google Group: All announcements, discussions, Q&A, etc. will take place on the CS342 Google group at
https://groups.google.com/a/wellesley.edu/d/forum/cs-342-01-fa14. It is expected you will consult this group on a daily basis. To help with this, your default settings are to receive all posts to this group in your personal email. You can also post to the group by sending email to
firstname.lastname@example.org. It is also expected that when you encounter interesting security-related news items, blog posts, articles, etc., that you will post these to the course Google group to start a discussion thread.
Hacking: The Art of Exploitation (HAE)
(2nd edition, 2008)
There are four copies of HAE on the security bookshelves in SCI 160A. You can also read an online copy available from the Wellesley College library.
Sean Smith and Jon Marchesini
The Craft of System Security (S&M)
Security Engineering (SE)
(2nd edition, 2008)
The complete book is available online
There are many other helpful books. papers, and online resources that you should consult.
See the schedule and resources pages.
Assignments: Most of the work you do in this course will be in the context of problem sets, which will typically be given out every week or two. The assignments are typically long and challenging, so you should start early and allocated sufficient time to finish them.
EDURange Activities: This semester, our class will be experimenting with numerous activities developed by EDURange, an NSF-funded project for creating cloud-based, interactive security exercises inspired by the Hacker Curriculum. Some of these activities will be the basis of hands-on exercises in lab or lecture; other activities will be part of assignments.
Course Porfolio: You must create a CS342 Portfolio --- a Google Doc shared with me --- for submitting work electronically in the course. The Course Blog (see below) and individual assignments will be submitted as separate Google Docs shared from the Portfolio doc. See Problem 1 of Problem Set 1 for details on creating your Portfolio.
Course Blog: You must create and maintain a CS342 Blog in which you record your journey through the course and reflect on that journey. This is a Google Doc that you should share with me and linked from your Portfolio. Every day you work on the course, you should add a dated entry to the top of this page summarizing your work for the day, emphasizing insights you gained, difficulties you encountered, resources you discovered, and security-related news/articles you read. It is especially important to reflect on problems from your assignments and activities that we do in class. If you think that a problem/activity was clear, confusing, too easy, too hard, valuable, a waste of time, etc., you should say this in your blog entries. Put all your entries in a single document in reverse chronological order. See Problem 1 of Problem Set 1 for details on creating your Blog.
Exams: There are no exams in this course. All work is hands-on work done in class or on assignments.
Projects: There will be no final project in this course. In past semesters, students have done an individual or team final project in this course. Students who wish to undertake a security-related project are encouraged to talk to me.
Grading: Your course grade will be determined based on the following:
- Your grades on the assignments.
- Your scores on the EDURange activities.
- The detail and level of reflection exhibited in your course blog (see above).
- Your participation in class and in discussions on the CS342 Google Group.
Finding Help: If you have any questions at all about the class (whether big or small, whether on problem sets lectures, reading, or whatever) please contact me. That’s what I'm here for! The best time to see me s during my scheduled office hours (listed at the top of this web page). If these times are not convenient, we can set up an appointment at some other time. If I can't meet in person, I may be able to have a virtual meeting with you via Google Hangout or Skype.
Also, because of course policy encouraging collaboration (see above), you should also
look to your fellow students for help. Your classmates are a valuable resource;
make good use of them!
Students With Special Needs: If you have any disabillities (including “hidden” ones, like learning disabilities), you are encouraged to meet with me to discuss accomodations that may be helpful to you.