CS155 Computer and Network Security

Course Syllabus

Spring 2014

 
Lecture 1:
4/ 1/14
(DB)
Course overview   [pdfppt]
Reading:

Part 1: Basics
 
Lecture 2:
4/ 3/14
(DB)
Control hijacking attacks: exploits and defenses   [pdfppt]
Reading:
 
Lecture 3:
4/ 8/14
(DB)
Dealing with legacy code: sandboxing and isolation   [pdfppt]
Reading:
 
Lecture 4:
4/10/14
(JM)
Tools for writing robust application code   [pdfppt]
Reading:
 
Lecture 5:
4/15/14
(JM)
Principle of least privilege, access control, and operating systems security   [pdfppt]
Reading:
 
Lecture 6:
4/17/14
(inv)
Exploitation techniques and fuzzing   (Alex Stamos)   [pdfppt]
Reading:
 
Lecture 7:
4/22/14
(DB)
Overview of cryptography   [pdfppt]
Reading:

Part 2: Web Security
 
Lecture 8:
4/24/14
(JM)
Basic web security model   [pdfppt]
Reading:
 
Lecture 9:
4/29/14
(JM)
Web application security   [pdfppt]
Reading:
 
Lecture 10:
5/ 1/14
(DB)
Session management and user authentication   [pdfppt]
Reading:
 
Lecture 11:
5/ 6/14
(JM)
Content Security Policies (CSP), Web workers, and extensions   [pdfppt]
Reading:
 
Lecture 12:
5/ 8/14
(DB)
HTTPS: goals and pitfalls   [pdfppt]
Reading:

Part 3: Network security
 
Lecture 13:
5/13/14
(DB)
Security issues in Internet protocols: TCP, DNS, and routing   [pdfppt]
Reading:
 
Lecture 14:
5/15/14
(JM)
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Reading:
 
Lecture 15:
5/20/14
(DB)
Unwanted traffic: denial of service attacks   [pdfppt]
Reading:
 
Lecture 16:
5/22/14
(DB)
Malware: Computer viruses, Spyware, and key-loggers
Reading:

Part 4: Security of mobile platforms
 
Lecture 17:
5/27/14
(JM)
Mobile platform security models: Android and iOS   [pdfppt]
Reading:
 
Lecture 18:
5/29/14
(JM)
Mobile threats and malware   [pdf]
Reading:
 
Lecture 19:
6/ 3/14
(inv)
Final lecture: Markus Jakobsson (Qualcomm)