CS155 Computer and Network Security

Course Syllabus

Spring 2014

 
Lecture 1:
4/ 1/14
(DB)
Course overview   [pdfppt]
Reading:

Part 1: Basics
 
Lecture 2:
4/ 3/14
(DB)
Control hijacking attacks: exploits and defenses   [pdfppt]
Reading:
 
Lecture 3:
4/ 8/14
(DB)
Dealing with legacy code: sandboxing and isolation   [pdfppt]
Reading:
 
Lecture 4:
4/10/14
(JM)
Tools for writing robust application code   [pdfppt]
Reading:
 
Lecture 5:
4/15/14
(JM)
Principle of least privilege, access control, and operating systems security   [pdfppt]
Reading:
 
Lecture 6:
4/17/14
(inv)
Exploitation techniques and fuzzing
Reading:
 
Lecture 7:
4/22/14
(DB)
Overview of cryptography   [pdfppt]

Part 2: Web Security
 
Lecture 8:
4/24/14
(JM)
Basic web security model   [pdfppt]
Reading:
 
Lecture 9:
4/29/14
(JM)
Web application security   [pdfppt]
Reading:
 
Lecture 10:
5/ 1/14
(DB)
Session management and user authentication   [pdfppt]
Reading:
 
Lecture 11:
5/ 6/14
(JM)
Content Security Policies (CSP), Web workers, and extensions
 
Lecture 12:
5/ 8/14
(DB)
HTTPS: goals and pitfalls   [pdfppt]
Reading:

Part 3: Network security
 
Lecture 13:
5/13/14
(DB)
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Reading:
 
Lecture 14:
5/15/14
(JM)
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Reading:
 
Lecture 15:
5/20/14
(DB)
Unwanted traffic: denial of service attacks   [pdfppt]
Reading:
 
Lecture 16:
5/22/14
(DB)
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
Reading:

Part 4: Security of mobile platforms
 
Lecture 17:
5/27/14
(JM)
Mobile platform security models: Android and iOS
 
Lecture 18:
5/29/14
(JM)
Mobile threats and malware
 
Lecture 19:
6/ 3/14
(inv)
Final lecture: Markus Jakobsson (Qualcomm)