Modules

The class is divied based on the high-level topics being covered. Each module listed on the sidebar has a list of lectures and associated resources based on that module.

Apr 2, 2026

Subsections of Modules

Authentication

Authentication is about determining that an entity, such as a person, has a desired property, such as knowing a password. The goal of authentication is ensuring that the system knows who is interacting with it and can therefore make later decisions, such as access control decisions, with confidence.

Slides

2025 Slides

News

Laws, regulations, and guidance

Research

Random Fun Stuff

  • * The password game - Simple game that keeps giving you new harder, more crazy, password rules as you progress.
Apr 23, 2025

Access Control

Access control is how the system manages access to various resources. Classically access control is defined in terms of who wants to perform what action on what resource and if that tripple of (who, action, resource) should be allowed.

Slides

2025 Slides

News

Wikipedia and other education pages

Research

Cryptography

Cryptography is the study of encryption approaches and is one of the most basic tools used in security. In this module we will cover some of the basic principles of cryptography and some of the most common cryptography aprroaches.

Slides

2025 Slides

Security in Computing - Chapter 2.1 and 2.2

Learning Goals

Understand

Encryption is not magic, it does not protect all things from all attacks, it is built on assumptions and like all tools is designed to perform specific tasks. Different types of cryptography are designed to solve different problems, think about the problems, constraints, and assumptions that can be made before selecting a cryptographic approach.

Remember

Difference between symetric and asymetric cryptography Keys, what they are for, assumptions about them, and what they do Stream and block ciphers

Apply

Think about the different tools that you use on a daily basis that claim they use encryption to protect you. Try looking up what kind of encryption they use and reason about why that type was chosen.

Additional Resources

Apr 23, 2025

Networking

Networking is how we reliably move data between computers over unstable and sometimes untrusted connections managed by strangers.

Slides

2025 Slides

Educational Networking Games

  • CS4G Network Simulator - an easy to understand and play simulator game that takes you through some of the most basic attacks in networking such as spoofing and a man in the middle attack
  • Permission Impossible - a simple drag-and-drop game designed to teach firewall concepts and rules
  • Blue Team - a more complicated firewall game that has you set firewall policies for multiple computers in a network, upper levels include some simple interaction with an intrusion detection system

News

Additional Resources

Secure Programming

Secure programming is a broad topic but roughly covers the security of operating systems and applications.

Slides

2025 Slides

News from Lecture

Below are some of the news stories cited in lecture or during the first 5 minutes.

Try it out

Below are some capture the flag sources online. These are not required for the course, but you may find them interesting to try out.

Additional Resources

Industry reports and resources

Research Papers

Web Security

Web security covers the security of web servers, browsers, users, and organizations that all interact over the Internet. This module starts with a quick course in how the Internet and websites function then moves on to more classic website attacks like Cross Site Scripting.

Slides

2025 Slides

  • 16-WebSecurity
    • Topics: How websites are built
  • 17-Cookies
    • Topics: Cookies, web tracking, cookie access control
  • 17-WebSecurity-XSS
    • Topics: Cross Site Scripting (XSS)
    • Note that a few “New Slide” slides were added after lectuer to give examples of a few points that were confusing.
  • 18-WebSecurity
    • Topics:

News

Additional Resources

Research Papers

Privacy

There are many deffinitions of privacy, in this class we learn a bit about those definitions including contextual privacy, user control over data flows, and privacy laws.

Slides

2025 Slides

Additional Resources