| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Class Organizations General Introduction  | 
General Introduction | Chapter 1 | 
Syllabus ( PDF Format)  | 
||
| Wednesday | General Introduction (Continued) Classic ciphers  | 
Classic ciphers | Chapter 2 | |||
| Friday | 
Classic ciphers (Continued) Stream ciphers  | 
Stream ciphers | 3.2 6.3 (Not required for exams)  | 
H: homework #1 (Due 9/8/2014)  | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers/Examples | Assignments | 
|---|---|---|---|---|---|---|
| Wednesday | Stream ciphers (continued) Block ciphers  | 
Block ciphers | 3.3.1, 6.4.4,  6.4.5 (not required for exams), 6.4.6 (not required for exams), 6.4.7  | 
"Breaking WEP Under 60 Seconds"
 (not required for exams) TDES  | 
||
| Friday | Block ciphers (continued)  | 
3.3.2 - 3.3.7, 3.4, 3.5 |  
 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Block ciphers (continued)  | 
Same as last time | H: homework #2 (Due 9/22/2014)  | 
|||
| Wednesday | 
Block ciphers (continued) Public Key Crypto  | 
Public Key Crypto | 4.1-4.4 6.5 (not required for exams) 6.6  | 
 | 
||
| Friday | Public Key Crypto (Continued)  | 
4.5-4.8 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Public Key Crypto (Continued)  | 
4.5-4.8 | ||||
| Wednesday | Public Key Crypto (Continued)  | 
4.5-4.8 | H: homework #3 (Due 10/1/2014)  | 
|||
| Friday | Hash Functions | Hash Functions | 5.1-5.6 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Hash Functions (Continued)  | 5.7-5.9 | 
||||
| Wednesday | Hash Functions (Continued)  | 5.7-5.9 | 
||||
| Friday | Authentication (Continued)  | 
Local Authentication | 7.1-7.3 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Authentication (Continued) Authorization  | 
Authorization Part I | 8.1-8.4 | |||
| Wednesday | Authentication (Continued) Authorization  | 
Authorization Part I | 8.1-8.4 | |||
| Friday | Authorization (Continued) Insider Threat (not required for exams)  | 
Insider Threat | 8.5-8.7 | 
H: Homework #4 (Due 10/13/2014)  | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Authorization (Continued) Simple Authentication Protocols  | 
Simple Authentication | 9.1-9.3 | |||
| Wednesday | Simple Authentication Protocols (Continued)  | 
(Same as last time) | 9.3-9.5 | H: Homework #5 (Due 10/27/2014)  | 
||
| Friday | Simple Authentication Protocols (Continued)  | 
(Same as last time) | 9.3-9.5 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Midterm Exam Review | 
 Midterm Exam Review  | 
||||
| Wednesday | 
Real-World Security Protocols  (Will NOT be on the midterm exam but will be on the final exam)  | 
Real-World Security | 10.1-10.3 | |||
| Friday (Oct. 17)  | 
Midterm Exam | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Midterm Exam Summary | 
H: homework #6 (Due 11/12/2014) H: homework #8 (Due 12/3/2014) P: Term Project Guideline (Brief proposal due: 11/10/2014; final report due: 5:00pm, 12/12/2014)  | 
||||
| Wednesday | Real-World Security Protocols (Continued)  | 
10.6-10.8 | ||||
| Friday | Real-World Security Protocols (Continued)  | 
10.6-10.8 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Real-World Security Protocols (Continued)  | 
|||||
| Wednesday | Real-World Security Protocols (Continued)  | 
|||||
| Friday | Real-World Security Protocols (Continued)  | 
Q: In-class quiz #2 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Software Flaws and Malware | Software Flaws and Malware | 11.1-11.3, 11.5-11.6 | |||
| Wednesday | Software Flaws and Malware (Continued)  | 
|||||
| Friday | Software Flaws and Malware (Continued)  | 
H: Homework #7 (Due 11/21/2014)  | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | SRE and DRM | SRE and DRM | 12.2-12.3 | |||
| Wednesday | 
SRE and DRM  (Continued)  | 
|||||
| Friday | Secure Software Development | Secure Software Development | 12.4 | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | 
Secure Software Development Operating System Security  | 
Operating System Security | 
Chapter 13 | |||
| Wednesday | 
Operating System Security (Continued)  | 
|||||
| Friday | 
Operating System Security (Continued)  | 
SELinux and Windows Case Studies | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | 
Operating System Security (Continued) Web Security  | 
Android Security Web Security  | 
OWASP Top 10 | |||
| Wednesday | Thanksgiving | No class | ||||
| Friday | Thanksgiving | No class | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Monday | Review for the final exam  | 
Review for Final Exam | ||||
| Wednesday | Review for the final exam  (Continued) Questions and answers  | 
|||||
| Friday | 
Case studies of real world security vulnerabilities DDOS and Defenses Advanced Topics and Summary (Information Flow, Tempest, and So on) (Not on the final exam)  | 
Stuxnet 
 DDOS Tempest HiStar  | 
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments | 
|---|---|---|---|---|---|---|
| Wednesday | December 10, 12:30 - 2:30PM | Final Exam (Cumulative) |