COSC235: Introduction to Network Security
Network Security

Who, What, and Where

Prof. Daniel Votipka


Email: click here

Office Hours:
Mondays 4:30-6:30pm, in St. Mary's Hall rm G-36, and Wednesdays 5:00-6:00pm, at The Midnight Mug, and by appointment

Sayako Quinlan


Email: click here

Office Hours:
Mondays 5:00-6:00pm, in St. Mary's Hall rm G-37 and Thursdays 12:00-2:00pm, at The Midnight Mug

Mary Joy Kozak


Email: click here

Office Hours:
Mondays 3:30-4:30pm, at The Midnight Mug and Wednesdays 11:00-1:00pm, in St. Mary's Hall rm G-37

Look left.

See below.

This class will take place on Mondays and Wednesdays from 6:30-7:45pm in TBD.
This class will also have an online presence. Students are expected (read: required) to participate in online discussions on Piazza.



This course introduces students to network security. By examining case studies and reading seminal research papers, students will learn about network attacks and vulnerabilities as well as current defenses. Topics covered include cryptography, confidentiality and authentication protocols, botnets, firewalls, intrusion detection systems, and communication privacy and anonymity.

Prerequisites: COSC-052


This introductory course will impart a broad understanding of the underpinnings of security techniques, security best practices, and computer security research. The course should help students to understand the mindsets of attackers (the bad guys and gals who do malicious things on the network) and system designers and defenders (the good guys and gals who try to stop the attackers). The course should prepare students to understand and assess security threats, become familiar with security engineering best practices, and write better software, protocols, and systems.

A Note about Network Security

This class covers both offensive and defensive computer and network security techniques. Enrollment in this class does not constitute a waiver of Georgetown's Acceptable Use Policy. Students are expected and required to obey all University policies. Talk to the instructor before conducting any network experiments.

Course Policies

Grading, academic integrity, etc.


Hopefully not too arbitrary

Academic Integrity

Dos and Definitely Do Nots


Will ye' pass, or will ye' fail?

Readings & Slides

The strongly suggested textbook for this class is Introduction to Computer Security by Michael Goodrich and Roberto Tamassia. All book readings, listed below, are optional. Non-book assignments (that is, the links to articles) are mandatory.

Note: To access the slides, you will need to be signed into Google with your NetID (e.g., and NetID password. Please do not request access from a personal GMail account.

Reading Assignments, Schedule, & Slides