Course Syllabus
Spring 2018
Lecture 1:
4/ 3/18
(DB)
|
Reading:
|
Part 1: Basics | |
Lecture 2:
4/ 5/18
(DB)
|
Reading:
|
Lecture 3:
4/10/18
(DB)
|
Reading:
|
Lecture 4:
4/12/18
(JM)
|
Reading:
|
Lecture 5:
4/17/18
(DB)
|
Reading:
|
Lecture 6:
4/19/18
(inv)
|
Exploitation techniques and fuzzing (Alex Stamos)
[pdf]
Reading:
|
Lecture 7:
4/24/18
(DB)
|
Reading:
|
Part 2: Web Security | |
Lecture 8:
4/26/18
(JM)
|
Reading:
|
Lecture 9:
5/ 1/18
(DB)
|
Reading:
|
Lecture 10:
5/ 3/18
(JM)
|
Reading:
|
Lecture 11:
5/ 8/18
(JM)
|
Reading:
|
Lecture 12:
5/10/18
(JM)
|
Reading: |
Part 3: Network security | |
Lecture 13:
5/15/18
(DB)
|
Reading:
|
Lecture 14:
5/17/18
(JM)
|
Reading:
|
Lecture 15:
5/22/18
(DB)
|
Reading:
|
Lecture 16:
5/24/18
(JM)
|
Reading: |
Lecture 17:
5/29/18
(inv)
|
Reading:
|
Part 4: Security of mobile platforms | |
Lecture 18:
5/31/18
(JM)
|
Reading: |
Lecture 19:
6/ 5/18
(JM)
|
Reading:
|