
Course Syllabus
Spring 2015
Lecture 1:
3/31/15
(DB)
|
Reading:
|
Part 1: Basics | |
Lecture 2:
4/ 2/15
(DB)
|
Reading:
|
Lecture 3:
4/ 7/15
(DB)
|
Reading:
|
Lecture 4:
4/ 9/15
(JM)
|
Reading:
|
Lecture 5:
4/14/15
(JM)
|
Reading:
|
Lecture 6:
4/16/15
(inv)
|
Reading:
|
Part 2: Web Security | |
Lecture 7:
4/21/15
(JM)
|
Reading:
|
Lecture 8:
4/23/15
(JM)
|
Reading:
|
Lecture 9:
4/28/15
(JM)
|
Content Security Policies (CSP), Web workers, and extensions
[pdf]
Reading:
|
Lecture 10:
4/30/15
(DB)
|
Reading:
|
Lecture 11:
5/ 5/15
(DB)
|
Reading:
|
Lecture 12:
5/ 7/15
(DB)
|
Reading:
|
Part 3: Network security | |
Lecture 13:
5/12/15
(DB)
|
Reading:
|
Lecture 14:
5/14/15
(JM)
|
Reading:
|
Lecture 15:
5/19/15
(DB)
|
Reading:
|
Part 4: Security of mobile platforms | |
Lecture 16:
5/21/15
(JM)
|
Reading:
|
Lecture 17:
5/26/15
(JM)
|
Reading:
|
Lecture 18:
5/28/15
(DB)
|
More on malware: viruses, Spyware and key-loggers
Reading:
|
Lecture 19:
6/ 2/15
(inv)
|
Final lecture: Oded Horovitz (Facebook)
|