CS155 Computer and Network Security

Course Syllabus

Spring 2010

 
Lecture 1:
3/30/10
(mit)
Course overview   [pdfppt]
Reading:
Part 1: Basics
 
Lecture 2:
4/ 1/10
(bon)
Control hijacking attacks: exploits and defenses   [pdfppt]
Reading:
 
Lecture 3:
4/ 6/10
(inv)
Exploitation techniques and fuzzing   [pdfppt]
Reading:
 
Lecture 4:
4/ 8/10
(mit)
Secure system design, access control, and protection   [pdfppt]
Reading:
 
Lecture 5:
4/13/10
(inv)
Tools for writing robust application code   [pdf]
Reading:
 
Lecture 6:
4/15/10
(mit)
Use of cryptography in computer security   [pdfppt]
Reading:
 
Lecture 7:
4/20/10
(bon)
Dealing with bad (legacy) application code: sandboxing and isolation   [pdfppt]
Reading:
Part 2: Web Security
 
Lecture 8:
4/22/10
(mit)
Basic web security model   [pdfppt]
Reading:
 
Lecture 9:
4/27/10
(bon)
User authentication and session management   [pdfppt]
Reading:
 
Lecture 10:
4/29/10
(mit)
Web application security   [pdfppt]
Reading:
 
Lecture 11:
5/ 4/10
(bon)
HTTPS: goals and pitfalls   [pdfppt]
Reading:
Part 3: Network security
 
Lecture 12:
5/ 6/10
(bon)
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Reading:
 
Lecture 13:
5/11/10
(mit)
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Reading:
 
Lecture 14:
5/13/10
(bon)
Unwanted traffic: denial of service attacks   [pdfppt]
Reading:
 
Lecture 15:
5/18/10
(bur)
Network security testing   [pdfppt]
Reading:
 
Lecture 16:
5/20/10
(bur)
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
Reading:
 
Lecture 17:
5/25/10
(bur)
bot-nets: attacks and defenses   [pdfppt]
Reading:
Part 5: Final topics
 
Lecture 18:
5/27/10
(bon)
The Trusted Computing Architecture   [pdfppt]
Reading:
 
Lecture 19:
6/ 1/10
(inv)
Final lecture