Please note that the schedule is subject to change.
| Date | Topics | Text | Notes |
|---|---|---|---|
| 1/30 |
Lecture: Overview & Basic Concepts
|
Introduction Slides Reflections on Trusting Trust TEMPEST Demonstration | |
| 2/1 |
Lecture: Security Concepts & Requirements
|
Chapter 1 | Security Concepts Slides Security Requirements Slides CSI Computer Crime and Security Survey Threat Actions and Consequences (from RFC 2828) ITU X.800 Standard |
| Date | Topics | Text | Notes |
|---|---|---|---|
| 2/6 |
Lecture: Stack Buffer Overflow
|
Chapter 10 |
|
| 2/8 |
Lecture: Buffer Overflow Defense
|
|
|
| 2/13 |
Lecture: Malicious Software I
|
Chapter 6 |
|
| 2/15 |
Lecture: Malicious Software II
|
|
|
| 2/20 |
Lecture: Malicious Software III
|
Sections 8.2 – 8.4 | |
| 2/22 | Lab 1: Return-to-libc | ||
| 2/26 | Unit 2 Homework Due | Solutions due on Piazza by 9:00 pm |
| Date | Topics | Text | Notes |
|---|---|---|---|
| 2/27 |
Lecture:
|
Chapter 2 |
|
| 3/1 |
Lecture:
|
There were no slides for this lecture. | |
| 3/6 |
Lecture:
|
Sections 20.1 – 20.3, 20.5 |
|
| 3/8 |
Lecture:
|
21.1 – 21.3 |
|
| 3/13 |
Lecture:
|
Sections 21.4, 21.5 |
Lab 1 Due by 11:59 pm
|
| 3/15 |
Lecture:
|
Appendix D |
|
| 3/19 – 3/23 | SPRING BREAK | ||
| 3/27 | Lab 2: Modern Cryptography | ||
| Date | Topics | Text | Notes |
|---|---|---|---|
| 4/3 |
Lecture: Authentication
|
3.1, 3.2 |
|
| 4/5 |
Lecture: More Authentication
|
3.2, 3.3 |
|
| 4/10 |
Lecture: Access Control
|
4.1 – 4.6 |
|
| 4/12 | Lab 3: Password Recovery |
| Date | Topics | Text | Notes |
|---|---|---|---|
| 4/17 |
Lecture: Network Security Intro
|
|
|
| 4/19 |
Lecture: DNS Security
|
|
|
| 4/24 |
Lecture: Secure Shell
|
|
|
| 4/26 | Lecture: SSH Weak Keys | ||
| 5/1 |
Lecture: Network Autentication
|
|
|
| 5/3 | Lab 4: Network Security |
| Date | Topics | Text | Notes |
|---|---|---|---|
| 5/8 |
Lecture: Economics of Cybersecurity
|
|
|
| 5/10 | Lecture: Legality & Ethics | 19.1 – 19.4 | |
| 5/15 | Wrap-up & Review |