Class Schedule
Date | Topics | Material and Notes |
Mon: 03/30 | Introduction and Security Basics | Slides |
Wed: 04/01 | Security Basics (cont.) and Network Security (TCP/IP) | Slides |
Mon: 04/06 | Network Security (cont.) | Discussion |
Wed: 04/08 | Network Security (cont.) | |
Mon: 04/13 | DNS and Routing Security | Slides, Discussion |
Wed: 04/15 | DNS and Routing Security (cont.) |
Mon: 04/20 | Web Security | Slides |
Wed: 04/22 | Web Security (cont.) | |
Mon: 04/27 | Web Security (cont.) | Discussion |
Wed: 04/29 | Memory Corruption | Slides |
Mon: 05/04 | Memory Corruption (cont.) | Discussion |
Wed: 05/06 | MIDTERM | |
Mon: 05/11 | Memory Corruption (cont.) | Discussion |
Wed: 05/13 | Authentication | Slides |
Mon: 05/18 | Authentication (cont.) | Discussion |
Wed: 05/20 | Cryptography I | Slides |
Mon: 05/25 | NO CLASS (Memorial Day) | |
Wed: 05/27 | Cryptography I (cont.) and Linear Cryptanalysis | Slides |
Mon: 06/01 | Cryptography II | Slides |
Wed: 06/03 | Cryptography II (cont.) and Class Summary | Jupyter Notebook for Project 6 |
Credits
Many of the slides are based on material shared by Engin Kirda, William Robertson, and Stefano Tessaro.