Date |
Topic |
Readings |
Start |
Due |
Tue 8/23 |
Course Introduction
(Lecture 1)
|
|
HW0 |
|
Thu 8/25 |
Security Fundamentals
(Lecture 2)
|
|
|
|
Tue 8/30 |
Symmetric Cryptography
(Lectures 3 & 4)
|
-
Tools and Jewels, Ch 2.1-2.2
|
HW1 |
HW0 |
Thu 9/1 |
Symmetric Cryptography
|
|
|
|
Tue 9/6 |
Hashes and MACs
(Lectures 5 & 6)
|
-
Tools and Jewels, Ch 2.5-2.7
|
|
|
Thu 9/8 |
Hashes and MACs
|
|
|
|
Tue 9/13 |
Asymmetric Cryptography
(Lecture 7)
|
-
Tools and Jewels, Ch 2.3-2.4
|
HW2 |
HW1 |
Thu 9/15 |
Key Management
(Lecture 8)
|
-
Tools and Jewels, Ch 4.3, 8
|
|
|
Tue 9/20 |
Exam 1 Q&A
|
|
|
|
Thu 9/22 |
Exam 1
|
|
|
|
Tue 9/27 |
User Authentication
(Lecture 9)
|
|
|
|
Thu 9/29 |
Authentication Protocols
(Lecture 10)
|
|
|
|
Tue 10/4 |
Exam 1 Review + Net Background
|
|
HW3 |
HW2 |
Thu 10/6 |
Net Background + TCP/IP Attacks
(Lecture 11)
|
-
Tools and Jewels, Ch 10.6, Ch 11.3-11.7
|
|
|
Tue 10/11 |
Fall Break
|
|
|
|
Thu 10/13 |
Transport Layer Security
(Lecture 12)
|
|
|
|
Tue 10/18 |
Firewalls and Tunnels
(Lecture 13)
|
|
HW4 |
HW3 |
Thu 10/20 |
Routing Security
(Lecture 14)
|
-
Why is it Taking so Long to Secure Internet Routing?
(link)
|
|
|
Tue 10/25 |
DNS Security
(Lecture 15)
|
-
An Illustrated Guide to the Kaminsky DNS Vulnerability
(link)
|
|
|
Thu 10/27 |
Malware
(Lecture 16)
|
|
HW5 |
HW4 (Due Sun 10/30) |
Tue 11/1 |
HW4 review + Exam 2 Q&A
|
|
|
|
Thu 11/3 |
University Wellness Day
|
|
|
|
Tue 11/8 |
Exam 2
|
|
|
|
Thu 11/10 |
Intrustion Detection Systems
(Lecture 17)
|
-
Tools and Jewels, Ch 11.1-11.2
|
|
|
Tue 11/15 |
Exam 2 Review + Wireless Security
(Lecture 18)
|
-
Tools and Jewels, Ch 12
(link)
|
|
|
Thu 11/17 |
Anonymity
(Lecture 19)
|
|
|
|
Tue 11/22 |
No Class
|
|
|
|
Fri 11/24 |
Thanksgiving Break
|
|
|
|
Tue 11/29 |
Web Security
(Lecture 20)
|
|
|
|
Thu 12/1 |
Wrap up / Course Review
(Lecture 21)
|
|
|
HW5 |
Thu 12/8 |
Final Exam
|
-
Normal classroom. 12:00-2:30pm
(link)
|
|
|