Lectures

Revision

Lecture

Date

Day

Module

Lecture Title

Activities Due

   

1

5-May

Monday

Introduction

Introduction

    

2

9-May

Friday

Authentication

Authentication

    

3

12-May

Monday

 

Authentication, Phishing

    

4

16-May

Friday

Access Control

Access Control

Read a breach report

   
 

19-May

Monday

 

No class – holiday

    

5

23-May

Friday

 

Access Control and Information Flow

Verify chat keys

   

6

26-May

Monday

Cryptography

Cryptography Introduction

    

7

30-May

Friday

 

Cryptography

Opt-out, Verify web cert

   

8

2-Jun

Monday

 

Cryptography

    

9

2-Jun

Monday

Networking

Networking

    

10

6-Jun

Friday

 

Networking

    
 

9-Jun

Monday

 

No class – Instructor gone

    

11

13-Jun

Friday

 

Networking

Modify URLs

   

12

16-Jun

Monday

Midterm

No class

    

13

20-Jun

Friday

Midterm

No class

    

14

23-Jun

Monday

 

Networking - tcp, onion routing, firewalls

   

15

27-Jun

Friday

Programming

Programming Security

Download data

   
 

30-Jun

Monday

 

No class – holiday

    

16

2-Jul

Wednesday

 

Programming security

    

17

4-Jul

Friday

 

Programming security

Block 3rd party content

   

18

7-Jul

Monday

Web Security

Class canceled

    

19

11-Jul

Friday

 

Web Security - Internet Basics

Modify website

   

20

14-Jul

Monday

 

Cookies, Web Security - XSS

    

21

18-Jul

Friday

Web Security

See data visible to websites

   

22

21-Jul

Monday

Privacy

Privacy

    

23

21-Jul

Monday

 

Privacy

    

24

25-Jul

Friday

 

Case Studies

Listen to phish, Read regulation

   

25

28-Jul

Monday

 

Revision

    
  • Red indicates lectures that are canceled.
  • Green indicates lectures at abnormal times.

Makeup Lectures

The University automatically assigns makeup lecture times for the course. These are to be used in the event that the Instructor has to be out of town or some unexpected event happens.

I recognize that these times may be challenging for some students to attend. Effort will be made to do lecture recording for any makeup lecture times used.

Expect to use:

  • Monday June 2nd, 4pm-5:20pm

Not expected to be used:

  • Monday May 12
  • Monday June 23
  • Monday July 21

Lecture Module Resources

Under each lecture module on the sidebar you will find links to many sources of information on the topic. These are optional readings, you are not required to read any of them. I am often asked after class about where to look to learn more about a topic or where to go if the topic is a bit challenging to understand from the lecture content. These resources are a good place to start for those interested.

I am always happy to add new resources to these lists, so if there is something recent that I have left off. Or even just something fun that you think others might enjoy, feel free to email me about them.

Apr 22, 2025

Subsections of Lectures

Authentication

Slides

News

Laws, regulations, and guidance

Research

Random Fun Stuff

  • * The password game - Simple game that keeps giving you new harder, more crazy, password rules as you progress.
Apr 23, 2025

Cryptography

Cryptography is the study of encryption approaches and is one of the most basic tools used in security. In this module we will cover some of the basic principles of cryptography and some of the most common cryptography aprroaches.

Slides

Security in Computing - Chapter 2.1 and 2.2

Learning Goals

Understand

Encryption is not magic, it does not protect all things from all attacks, it is built on assumptions and like all tools is designed to perform specific tasks. Different types of cryptography are designed to solve different problems, think about the problems, constraints, and assumptions that can be made before selecting a cryptographic approach.

Remember

Difference between symetric and asymetric cryptography Keys, what they are for, assumptions about them, and what they do Stream and block ciphers

Apply

Think about the different tools that you use on a daily basis that claim they use encryption to protect you. Try looking up what kind of encryption they use and reason about why that type was chosen.

Additional Resources

Apr 23, 2025

Networking

Slides

Educational Games

  • CS4G Network Simulator - an easy to understand and play simulator game that takes you through some of the most basic attacks in networking such as spoofing and a man in the middle attack
  • Permission Impossible - a simple drag-and-drop game designed to teach firewall concepts and rules
  • Blue Team - a more complicated firewall game that has you set firewall policies for multiple computers in a network, upper levels include some simple interaction with an intrusion detection system

Additional Resources

Secure Programming

Slides

News from Lecture

Below are some of the news stories cited in lecture or during the first 5 minutes.

Try it out

Below are some capture the flag sources online. These are not required for the course, but you may find them interesting to try out.

Additional Resources

Industry reports and resources

Research Papers

Web Security

Slides

  • 16-WebSecurity
    • Topics: How websites are built
  • 17-Cookies
    • Topics: Cookies, web tracking, cookie access control
  • 17-WebSecurity-XSS
    • Topics: Cross Site Scripting (XSS)
    • Note that a few “New Slide” slides were added after lectuer to give examples of a few points that were confusing.
  • 18-WebSecurity
    • Topics:

News

Additional Resources

Research Papers

Revision

2024 Exam

  • 2024 Exam - Hand annotation indicates questions where the content was either not covered in 2025 or covered in less depth.
  • 2024 Exam Answers - Sample solutions. Multiple answers are possible for some of the questions, the solutions provided are only one possible answer.

Differences between 2024 and 2025

  • STRIDE was a whole lecture in 2024, but only briefly mentioned in 2025
  • NAT was well covered in 2024, mostly removed in 2025
  • Onion Routing covered in more depth in 2025
  • New 2025 content: Metldown/Spector, Rowhammer