Lectures

Lecture

Date

Day

Module

Lecture Title

Activities Due

   

1

5-May

Monday

Introduction

Introduction

    

2

9-May

Friday

Authentication

Authentication

    

3

12-May

Monday

 

Authentication, Phishing

    

4

16-May

Friday

Access Control

Access Control

Read a breach report

   
 

19-May

Monday

 

No class – holiday

    

5

23-May

Friday

 

Access Control and Information Flow

Verify chat keys

   

6

26-May

Monday

Cryptography

Cryptography Introduction

    

7

30-May

Friday

 

Cryptography

Opt-out, Verify web cert

   

8

2-Jun

Monday

 

Cryptography

    

9

2-Jun

Monday

Networking

Networking

    

10

6-Jun

Friday

 

Networking

    
 

9-Jun

Monday

 

No class – Instructor gone

    

11

13-Jun

Friday

 

Networking

Modify URLs

   

12

16-Jun

Monday

Midterm

No class

    

13

20-Jun

Friday

Midterm

No class

    

14

23-Jun

Monday

 

Networking - tcp, onion routing

    

15

27-Jun

Friday

Programming

Programming Security

Download data

   
 

30-Jun

Monday

 

No class – holiday

    

16

2-Jul

Wednesday

 

Program security

    

17

4-Jul

Friday

 

Programming security  

Block 3rd party content

   

18

7-Jul

Monday

Web Security

Web Security - People

    

19

11-Jul

Friday

 

Web Security - XSS

Modify website

   

20

14-Jul

Monday

 

Web Security - defenses

    

21

18-Jul

Friday

Privacy

Privacy

See data visible to websites

   

22

21-Jul

Monday

 

Privacy

    

23

25-Jul

Friday

 

Additional topics

Listen to phish, Read regulation

   

24

28-Jul

Monday

 

Revision

    
  • Red indicates lectures that are canceled.
  • Green indicates lectures at abnormal times.

Makeup Lectures

The University automatically assigns makeup lecture times for the course. These are to be used in the event that the Instructor has to be out of town or some unexpected event happens.

I recognize that these times may be challenging for some students to attend. Effort will be made to do lecture recording for any makeup lecture times used.

Expect to use:

  • Monday June 2nd, 4pm-5:20pm

Not expected to be used:

  • Monday May 12
  • Monday June 23
  • Monday July 21

Lecture Module Resources

Under each lecture module on the sidebar you will find links to many sources of information on the topic. These are optional readings, you are not required to read any of them. I am often asked after class about where to look to learn more about a topic or where to go if the topic is a bit challenging to understand from the lecture content. These resources are a good place to start for those interested.

I am always happy to add new resources to these lists, so if there is something recent that I have left off. Or even just something fun that you think others might enjoy, feel free to email me about them.

Apr 22, 2025

Subsections of Lectures

Authentication

Slides

News

Laws, regulations, and guidance

Research

Random Fun Stuff

  • * The password game - Simple game that keeps giving you new harder, more crazy, password rules as you progress.
Apr 23, 2025

Cryptography

Cryptography is the study of encryption approaches and is one of the most basic tools used in security. In this module we will cover some of the basic principles of cryptography and some of the most common cryptography aprroaches.

Slides

Security in Computing - Chapter 2.1 and 2.2

Learning Goals

Understand

Encryption is not magic, it does not protect all things from all attacks, it is built on assumptions and like all tools is designed to perform specific tasks. Different types of cryptography are designed to solve different problems, think about the problems, constraints, and assumptions that can be made before selecting a cryptographic approach.

Remember

Difference between symetric and asymetric cryptography Keys, what they are for, assumptions about them, and what they do Stream and block ciphers

Apply

Think about the different tools that you use on a daily basis that claim they use encryption to protect you. Try looking up what kind of encryption they use and reason about why that type was chosen.

Additional Resources

Apr 23, 2025

Networking

Slides

Educational Games

  • CS4G Network Simulator - an easy to understand and play simulator game that takes you through some of the most basic attacks in networking such as spoofing and a man in the middle attack
  • Permission Impossible - a simple drag-and-drop game designed to teach firewall concepts and rules
  • Blue Team - a more complicated firewall game that has you set firewall policies for multiple computers in a network, upper levels include some simple interaction with an intrusion detection system

Additional Resources