Course Syllabus
Spring 2014
Lecture 1:
4/ 1/14
(DB)
|
Reading:
|
Part 1: Basics | |
Lecture 2:
4/ 3/14
(DB)
|
Reading:
|
Lecture 3:
4/ 8/14
(DB)
|
Reading:
|
Lecture 4:
4/10/14
(JM)
|
Reading:
|
Lecture 5:
4/15/14
(JM)
|
Reading:
|
Lecture 6:
4/17/14
(inv)
|
Reading:
|
Lecture 7:
4/22/14
(DB)
|
Reading:
|
Part 2: Web Security | |
Lecture 8:
4/24/14
(JM)
|
Reading:
|
Lecture 9:
4/29/14
(JM)
|
Reading:
|
Lecture 10:
5/ 1/14
(DB)
|
Reading:
|
Lecture 11:
5/ 6/14
(JM)
|
Reading: |
Lecture 12:
5/ 8/14
(DB)
|
Reading:
|
Part 3: Network security | |
Lecture 13:
5/13/14
(DB)
|
Reading:
|
Lecture 14:
5/15/14
(JM)
|
Reading:
|
Lecture 15:
5/20/14
(DB)
|
Reading:
|
Lecture 16:
5/22/14
(DB)
|
Malware: Computer viruses, Spyware, and key-loggers
Reading:
|
Part 4: Security of mobile platforms | |
Lecture 17:
5/27/14
(JM)
|
Reading:
|
Lecture 18:
5/29/14
(JM)
|
Mobile threats and malware
[pdf]
Reading:
|
Lecture 19:
6/ 3/14
(inv)
|
Final lecture: Markus Jakobsson (Qualcomm)
|