CS155 Computer and Network Security

Course Syllabus

Spring 2010

 
Lecture 1:
3/29/11
(bon)
Course overview   [pdfppt]
Reading:
Part 1: Basics
 
Lecture 2:
3/31/11
(bon)
Control hijacking attacks: exploits and defenses   [pdfppt]
Reading:
 
Lecture 3:
4/ 5/11
(inv)
Exploitation techniques and fuzzing   [pdfppt]
Reading:
 
Lecture 4:
4/ 7/11
(mit)
Secure system design, access control, and protection   [pdfppt]
Reading:
 
Lecture 5:
4/12/11
(mit)
Tools for writing robust application code   [pdf]
Reading:
 
Lecture 6:
4/14/11
(bon)
Dealing with bad (legacy) application code: sandboxing and isolation   [pdfppt]
Reading:
 
Lecture 7:
4/19/11
(mit)
Use of cryptography in computer security   [pdfppt]
Reading:
Part 2: Web Security
 
Lecture 8:
4/21/11
(mit)
Basic web security model   [pdfppt]
Reading:
 
Lecture 9:
4/26/11
(bon)
User authentication and session management   [pdfppt]
Reading:
 
Lecture 10:
4/28/11
(mit)
Web application security   [pdfppt]
Reading:
 
Lecture 11:
5/ 3/11
(bon)
HTTPS: goals and pitfalls   [pdfppt]
Reading:
Part 3: Network security
 
Lecture 12:
5/ 5/11
(bon)
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Reading:
 
Lecture 13:
5/10/11
(mit)
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Reading:
 
Lecture 14:
5/12/11
(bur)
Network security testing   [pdfppt]
Reading:
 
Lecture 15:
5/17/11
(bur)
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
Reading:
 
Lecture 16:
5/19/11
(bur)
bot-nets: attacks and defenses   [pdfppt]
Reading:
 
Lecture 17:
5/24/11
(bon)
Unwanted traffic: denial of service attacks   [pdfppt]
Reading:
Part 5: Final topics
 
Lecture 18:
5/26/11
(bon)
The Trusted Computing Architecture   [pdfppt]
Reading:
 
Lecture 19:
5/31/11
(inv)
Final lecture