Date | Topic | Reading | Lecture Notes |
Tuesday, Jan. 18 | Syllabus What is security? |
Computer Security in the Real World | Lecture Notes |
Thursday, Jan. 20 | Class canceled | Read chapter 3 of course textbook | |
Tuesday, Jan. 25 | Authentication | Chapter 3 of course textbook | Lecture Notes |
Thursday, Jan. 27 | Access Control | Chapter 4, Chapter 10 | Lecture Notes |
Tuesday, Feb. 1 | No class - snow day | ||
Thursday, Feb. 3 | Lab 1 | ||
Tuesday, Feb. 8 | Network Security | Chapter 9, 6 | Lecture Notes |
Thursday, Feb. 10 | Cryptography | Chapter 2 | Lecture Notes |
Tuesday, Feb. 15 | Malware | Chapter 7, 11 of text | Lecture Notes |
Thursday, Feb. 17 | History of Computer Security | Various online references | Lecture Notes |
Tuesday, Feb. 22 | Case Study | Lecture Notes | |
Thursday, Feb. 24 | Networking | Various online references | Lecture Notes |
Tuesday, March 1 | Networking | Various online references | Lecture Notes |
Thursday, March 3 | Midterm exam | ||
Tuesday, March 8 | Software Security | Chapter 11-12 | |
Thursday, March 10 | Trusted Computing | Chapter 10 | |
Tuesday, March 22 | Physical security | Chapter 13 (loosely) | Lecture Notes |
Thursday, March 24 | Database Security | Chapter 5 | Slides (in powerpoint) |
Tuesday, March 29 | Linux Security | Chapter 23 | Slides (in powerpoint) |
Thursday, March 31 | Linux part 2 | Chapter 23 | Lecture Notes |
Tuesday, April 5 | Windows | Chapter 24 | Lecture Notes |
Thursday, April 7 | Windows part 2 | Chapter 24 | Lecture Notes |
Tuesday, April 12 | Legal Issues | Chapter 18 | Lecture Notes |
Thursday, April 14 | Logging | Chapter 15 | Lecture Notes |
Tuesday, April 19 | Ethics | In class discussion | |
Tuesday, April 26 | Ethics | In class discussion | |
Thursday, April 28 | Intrusion Detection | Chapter 6 | Lecture Notes |