Computer & Network Security #
This is the course website for the Fall 2026 offering of CSC/ECE 574 Computer & Network Security at North Carolina State University (NC State).
Computer & Network Security is a computer security course for graduate and advanced undergraduate students introducing the concepts and methods of human-centered cyber security research. Topics include the design, planning, execution, and statistical analysis of research studies.
| Course Name | Computer & Network Security |
| Course Number | CSC/ECE 574 |
| Semester | Fall 2026 |
| Format | In-person, recorded |
| Credits | 3 |
| Meeting Times | TBA |
| Meeting Location | TBA |
| Instructor | Dominik Wermke (Office hours) |
| External | Moodle, Gradescope, Panopto |
Course Overview #
Computer & Network Security provides a graduate-level introduction to computer and network security and privacy covering four key topic areas: basics of cryptography and crypto protocols, network security, systems security, and privacy.
This is likely the first of a set of courses security PhD students and MS students who pursue the MS Track in Security will take, and it serves as an introduction to material that will be covered in later security electives in cryptography, network security, software security, systems security, and privacy.
It is also suitable as a single elective for MS students and PhD students who wish to enrich their education with an expanded base of computer security experience.
Requirements & Restrictions #
Formal: (CSC 316 or ECE 309) and (CSC 401 or ECE 407) or equivalent
Informal: You need to understand (1) IP networks, (2) modern operating systems (e.g., Windows, Linux), (3) discrete mathematics, (4) basics of systems theory and implementation (e.g., file systems, distributed systems, networking, operating systems, etc.). If you do not have a basic understanding of these areas, you will have difficulty with the course. If you have questions regarding these prerequisites, please contact the instructor.
Skills: This is a graduate-level course in computer science. Students are expected to have basic knowledge of the Unix command line. They should also be able to pick up a new programming language (e.g., Python) with relative ease.
Hardware: NC State’s Online and Distance Education provides technology requirements and recommendations for computer hardware.
Structure #
- This course meets in-person twice a week (no attendance taken) and recordings are provided on Panopto.
- Content is primarily delivered via lectures with integrated learning activities.
- The course will consist of a midterm, a final, and either four mini-projects or a research project.
- 40% – Projects (Research Project or Mini Projects)
- 25% – Final Exam
- 25% – Midterm Exam
- 10% – Paper Discussion / Class Participation
Aside from this Course Website:
- Online discussion will take place on Ed Discussion.
- Homework assignments are submitted via GradeScope.
- Recordings of lectures will be available via Panopto.
- The initial quiz and some backlinks to the other services are on Moodle.
Outcomes #
The goal of CSC/ECE 574 is to provide students with a foundation of computer security fundamentals. By the end of this course, students will be able to:
- Fundamentals: Specify a security model for a given computer system
- Crypto: Explain and apply concepts related to applied cryptography, including plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, digital signatures.
- Authentication: Outline the requirements and mechanisms for identification and authentication of users and computer systems, including authentication protocols and key management. Identify the possible threats to each mechanism and ways to protect against these threats.
- Network: Identify common network and application layer attacks and defense mechanisms.
- Software: Explain and identify instances of common software vulnerabilities and mitigations.
- System: Explain concepts related to access control and operating system security, including access control matrices, ACLs and capabilities, protection, reference monitors, least privilege, discretionary access control, mandatory access control.
- Privacy: Identify and explain common privacy definitions, techniques, and systems that preserve or reduce privacy.
- Research: Read and interpret bleeding-edge academic research papers on computer and network security and privacy, and describe how the results impact real systems and people.
After graduation, students can use the material of this course to design, analyze, and critique secure computing designs.
Staff #
| Role | Instructor |
| dwermke@ncsu.edu | |
| Web | https://dwermke.com https://www.csc.ncsu.edu/people/dwermke |
| Office Hours | online, booked as 15 min slots (See office hours for booking URL) |
| Role | Teaching Assistant |
Office Hours #
Prof. Wermke’s online office 15min slots scheduled via Google Calender: TBA
Additional Materials #
Note: You should never need to pay to download an article from the reading (e.g., from the ACM Digital Library). If you are on campus, you won’t be prompted to purchase articles. If you are off campus, you can go through the University Library. Alternatively, you can use the library’s EZproxy.
Books that might provide some useful additional information and insights (but are not required for this course):
- Paul C. Van Oorschot. Computer Security and the Internet: Tools and Jewels. Springer. 2020. Note: Author’s self-archived version is freely available.
- Network Security: Private Communication in a Public World by Kaufman, Perlman, Speciner, and Perlman. 3rd Edition only. ISBN: 978-0136643609.
- Ross Anderson. Security Engineering, 2nd Edition. Wiley. April 2008.
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press. October 1996.
Further Resources #
Further resources for wellbeing:
Up-to-date overview at NC State’s “Academic and Student Affairs” website.