Cybersecurity
Advanced topics in cybersecurity and the use of machine learning for security applications. Provides students with the knowledge to design secure systems and leverage ML for security.
Resources
Hands-on explainer for UNIX permission bits, inodes, SetUID/SetGID/Sticky, and ACLs. Includes a live permission builder and scenario examples.
Interactive in-browser lab simulating a vulnerable application backed by an in-memory database. Covers login bypass (tautology, comment injection), UNION-based data extraction, error-based schema enumeration, blind time-based injection, and parameterized query defense — all without a real server.
Three interactive labs covering OS security concepts: a Chroot Jail explorer that simulates a compromised web server with and without process isolation; the Biba Integrity Model with immediate allow/deny verdicts for any subject–operation–object combination (including Windows MIC examples); and a Virtualization Architecture compromise simulator for Type 1, Type 2, and Container stacks.
Minimal web application for comparing aligned and unaligned (base) LLM models through inference. Lets students observe first-hand how safety alignment changes model behaviour and explore the security implications of deploying unguarded language models.