Course Schedule - Spring Semester 2023

     

Meeting location information can now be found on student schedules in ESTHER (for students) or on the Course Roster in ESTHER (for faculty and instructors).
Additional information available here.

COLL 123 002 (CRN: 24405)

INTRO TO COMPETITIVE HACKING

Long Title: INTRO TO COMEPTITIVE HACKING (WILL RICE)
Department: College Courses
Instructor: Minocha, Shreyas
Meeting: 7:00PM - 7:50PM W (9-JAN-2023 - 21-APR-2023) 
Part of Term: Full Term - No WL Purge
Grade Mode: Satisfactory/Unsatisfactory
Course Type: Seminar
Language of Instruction: Taught in English
Method of Instruction: Face to Face
Credit Hours: 1
Course Syllabus:
Course Materials: Rice Campus Store
 
Restrictions:
Must be enrolled in one of the following Level(s):
Undergraduate Professional
Visiting Undergraduate
Undergraduate
Section Max Enrollment: 19
Section Enrolled: 11
Waitlisted: 0 (Max 99) 
Current members of the waitlist have priority for available seats.
Enrollment data as of: 29-APR-2024 1:54PM
 
Additional Fees: None
 
Final Exam: No Final Exam
Final Exam Time:
29-APR-2023  
2:00PM - 5:00PM S
 
Description: According to the FBI, over 2.2 million complaints of internet crimes were made to the FBI's Internet Crime Complaint Center between 2015 and 2020. What is ``secure enough''? How can we spot and avoid vulnerabilities? Adopting a ``hacker mindset'' is a useful tool to find potential vulnerabilities in the digital systems that surround us. We can then apply the same tools and attitudes to protect these systems—from physical security to healthcare technology—from malicious actors. Capture the Flag (CTF) competitions allow hacking enthusiasts to put their skills to a test in a fun, competitive environment. Competitors are presented with challenges of varying difficulty; capturing the titular flag may require reverse engineering a compiled binary, cracking passwords, bypassing authentication mechanisms, and more. In 'Intro to Competitive Hacking', students will learn about CTF challenges and the concepts that underpin them. In class, they would be introduced to the theory behind networks, cryptography, the modern web, and more. Outside class, students will be assigned challenges from real CTFs to practice their hacking skills. Additionally, they will learn to watch for flaws in the software they write and to defend against vulnerabilities. Finally, they will be motivated to try to understand how digital black boxes work when they encounter them.