Date | Syllabus | Note |
---|---|---|
Jan 21 & Jan 23 | Introduction -- How to think like an attacker Required reading: Reflections on trusting trust Inside the twisted mind of the security professional | |
Jan 28 & Jan 30 | Introduction to Cryptography, Symmetric-Key Cryptography, i.e., Alice and Bob: A Secret Love Affair in a Public World. Required Reading: Sections 1.1, 1.2, and 1.3 of Introduction to Modern Cryptography, by Katz and Lindell | |
Feb 04 & Feb 06 | Symmetric-Key Cryptography | Lab 1 due, Feb 5th (Secret-key Encryption) |
Feb 11 & Feb 13 | Key Exchange, Public-Key Cryptography | |
Feb 18 & Feb 20 | Public-Key Cryptography | |
Feb 25 & Feb 27 | Crypto Pitfalls Optional Reading: Intercepting Mobile Communications: The Insecurity of 802.11 Security Problems in 802.11-Based Networks Analysis of an Electronic Voting System | Midterm 1: Feb 27 |
Mar 04 & Mar 06 | Introduction to System Security, Access Control | |
Mar 11 & Mar 13 | Buffer Overflow, Input Validation | |
Mar 18 & Mar 20 | Spring Break, No Lecture | |
Mar 25 & Mar 27 | Trusted Computing | |
Apr 01 & Apr 03 | Web Security: Browser Security Model, Cross-Site Scripting, Cross-Site Request Forgery | |
Apr 08 & Apr 10 | Network Security: Password-Based Authentication, Password Security | Midterm 2: Apr 8 |
Apr 15 & Apr 17 | Network Security Protocols in Practice: SSL, IPSEC | |
Apr 22 & Apr 24 | Public-Key Infrastructure | |
Apr 29 & May 01 | Privacy and Anonymity | |
May 06 & May 08 | Privacy and Anonymity | Final: May 8 |