Winter 2024

Introduction to Hacking:

Exploitation and Protection of Systems and Software

00000000 ef bb bf 45 43 45 20 39 36 30 39 62 20 2f 20 39 |...ECE 9609b / 9| 00000010 30 36 39 62 0a 57 69 6e 74 65 72 20 32 30 32 34 |069b.Winter 2024| 00000020 0a 49 6e 74 72 6f 64 75 63 74 69 6f 6e 20 74 6f |.Introduction to| 00000030 20 48 61 63 6b 69 6e 67 0a 00 00 00 00 00 00 00 | Hacking........|

Overview

It is difficult to read the news today without encountering a story about a new security vulnerability. Have you ever wondered how these vulnerabilities come about, and how they are discovered, exploited and fixed?

This course will introduce you to basic concepts and techniques used in the exploitation of systems and software (i.e., hacking). From activists to cyber criminals to national security agencies, hackers are an inescapable reality of the information age. The goal of this course is, as the saying goes, to know your enemy so that you might defend yourself against them.