This schedule is subject to change. Please check back frequently.
Monday Lecture | Wednesday Lecture | Thursday Discussion |
---|---|---|
Jan. 14 Chapter 0 - Administrivia Chapter 1 - Adversarial Mindset |
Jan. 16 Chapter 2 - Ethics and the Law Legal, Cybercrime, Ethics |
Jan. 21 MLK |
Jan. 23 Chapter 3 - Simple Buffer Overflow Application Security, Buffer overflow (simple) |
Introduce OS, AppSec MP1 Intro |
Jan. 28 Chapter 4 - Advanced Buffer Overflow Application Security, Heap, Format string, Defenses (ASLR, DEP) AppSec Project, Checkpoint 1 due 6pm
|
Jan. 21 COLD DAY |
AppSec MP2 CP2 |
Feb. 4 Chapter 4 - Advanced Buffer Overflow Application Security, Heap, Format string, Defenses (ASLR, DEP) |
Feb. 6 Chapter 4 - Advanced Buffer Overflow Application Security, Heap, Format string, Defenses (ASLR, DEP) Chapter 12 - Web Security SQLi, Web Security AppSec Project, Checkpoint 2 due 6pm
|
Websec MP Intro |
Feb. 11 Chapter 12 - Web Security SQLi, Web Security |
Feb. 13 Chapter 12 - Web Security SQLi, Web Security Chapter 6 - Malware Malware, APTs, Propagation, Payloads, Rootkits Web Project, Checkpoint 1 due 6pm
|
WebSec CP2 |
Feb. 18 Chapter 6 - Malware Malware, APTs, Propagation, Payloads, Rootkits Chapter 7 - Malware Defense Malware Countermeasures |
Feb. 20 Chapter 7 - Malware Defense Malware Countermeasures Chapter 8 - Testing White Box, Black Box Testing, Reverse Engineering |
Feb. 25 Chapter 9 - Access Control Access Control, Role based access control Chapter 10 - Isolation Virtualization, Isolation Web Project, Checkpoint 2 due 6pm
|
Feb. 27 Chapter 15 - Authentication Authentication, Passwords, Token-based authentication, Biometric, Two Factor, Identity |
Crypto CP1 |
Mar. 4 Chapter 16 - Message Integrity Integrity, Hashes + HMACs Crypto Project, Checkpoint 1 due 6pm
|
Mar. 6 Chapter 16 - Message Integrity Integrity, Hashes + HMACs Chapter 17 - Confidentiality Confidentiality, Symmetric Encryption, Block ciphers |
Crypto CP2 |
Mar. 11 Chapter 17 - Confidentiality Confidentiality, Symmetric Encryption, Block ciphers Chapter 18 - Key Exchange and Key Management Public Key management, Key distribution, RSA, DH |
Mar. 13 Chapter 18 - Key Exchange and Key Management Public Key management, Key distribution, RSA, DH Chapter 22 - Networking Attacks Kirill explains why the Internet was a big mistake Crypto Project, Checkpoint 2 due 6pm
|
NetSec Intro |
Mar. 18 Spring Break |
Mar. 20 Spring Break |
Mar. 25 Chapter 22 - Networking Attacks Kirill explains why the Internet was a big mistake |
Mar. 27 Chapter 22 - Networking Attacks Kirill explains why the Internet was a big mistake Networking Project, Checkpoint 1 due 6pm
|
NetSec CP2 |
Apr. 1 Chapter 22 - Networking Attacks Kirill explains why the Internet was a big mistake |
Apr. 3 Chapter 22 - Networking Attacks Kirill explains why the Internet was a big mistake |
Apr. 8 Chapter 23 - Networking Defenses Intrusion Detection, Firewalls, Intrusion Prevention, Honeypots, Examples: Snort, Bro Networking Project, Checkpoint 2 due 6pm
|
Apr. 10 Chapter 23 - Networking Defenses Intrusion Detection, Firewalls, Intrusion Prevention, Honeypots, Examples: Snort, Bro Chapter 30 - Foreniscs, Auditing, Logging Security Auditing Techniques, Logging, Provenance |
MP5 Intro |
Apr. 15 Chapter 25 - Worms and Botnets Botnets Forensics Project, Checkpoint 1 due 6pm
|
Apr. 17 Chapter 26 - Abuse, Spam, Phishing Abuse, Phishing/Scams, Soofing/Spamming |
MP5 CP2 |
Apr. 22 Chapter 26 - Abuse, Spam, Phishing Abuse, Phishing/Scams, Soofing/Spamming Chapter 24 - DDoS DoS, Flooding, Reflection, Amplification |
Apr. 24 Chapter 24 - DDoS DoS, Flooding, Reflection, Amplification Chapter 21 - Anonynimity and Privacy Privacy, E-Voting, Censorship, Anonymity, Privacy preserving data mining Forensics Project, Checkpoint 2 due 6pm
|
Apr. 29 u-pick-em Topics to be selected by the students |
May. 1 Final Thoughts The one where Bailey summerizes an entire semester in flashbacks |