Date |
Topic |
Readings |
Mon 8/21 |
Course Introduction
(Slides)
|
|
Wed 8/23 |
Security Fundamentals
(Slides)
|
|
Mon 8/28 |
Symmetric Cryptography
(Slides)
|
-
Tools and Jewels, Ch 2.1-2.2
|
Wed 8/30 |
Symmetric Cryptography
(Slides)
|
|
Mon 9/4 |
Labor Day (No Class)
|
|
Wed 9/6 |
Hashes and MACs
(Slides)
|
-
Tools and Jewels, Ch 2.5-2.7
|
Mon 9/11 |
Hashes and MACs
(Slides)
|
|
Wed 9/13 |
Asymmetric Cryptography
(Slides)
|
-
Tools and Jewels, Ch 2.3-2.4
|
Mon 9/18 |
Key Management
(Slides)
|
-
Tools and Jewels, Ch 4.3, 8
|
Tue 9/19 |
University Wellness Day
|
|
Wed 9/20 |
User Authentication
(Slides)
|
|
Mon 9/25 |
Exam 1 Q&A
|
|
Wed 9/27 |
Exam 1
|
|
Mon 10/2 |
Authentication Protocols
(Slides)
|
|
Wed 10/4 |
Authentication Protocols
(Slides)
|
|
Mon 10/9 |
Fall Break
|
|
Wed 10/11 |
Transport Layer Security
(Slides)
|
|
Mon 10/16 |
Net Background + TCP/IP Attacks
(Slides)
|
-
Tools and Jewels, Ch 10.6, Ch 11.3-11.7
|
Wed 10/18 |
Malware
(Slides)
|
|
Mon 10/23 |
Firewalls and Tunnels
(Slides)
|
|
Wed 10/25 |
Intrustion Detection Systems
(Slides)
|
-
Tools and Jewels, Ch 11.1-11.2
|
Mon 10/30 |
Routing Security
(Slides)
|
-
Why is it Taking so Long to Secure Internet Routing?
(link)
|
Wed 11/1 |
DNS Security
(Slides)
|
-
An Illustrated Guide to the Kaminsky DNS Vulnerability
(link)
|
Mon 11/6 |
Wireless Security
(Slides)
|
-
Tools and Jewels, Ch 12
(link)
|
Wed 11/8 |
Cloud Security
(Slides)
|
|
Mon 11/13 |
Exam 2 Q&A
|
|
Wed 11/15 |
Exam 2
|
|
Mon 11/20 |
Web Security
(Slides)
|
|
Wed 11/22 |
Thanksgiving Break
|
|
Mon 11/27 |
Anonymity
(Slides)
|
|
Wed 11/29 |
Exam 2 Review
|
|
Mon 12/4 |
Wrap up / Course Review
|
|
Wed 12/13 |
Final Exam
|
-
Normal classroom. 12:00-2:30pm
(link)
|