ScheduleΒΆ

This schedule may change as the course progresses.

Monday Tuesday Wednesday Thursday Friday
Jan 18
Martin Luther King Day
Jan 19 Jan 20 Jan 21 Jan 22: Course Introduction
LEC 1: Overview of the Course (Video, Slides)
Readings: Information Security (Wikipedia)
Jan 25 Jan 26 Jan 27 Jan 28 Jan 29: Cryptography
LEC 2: Terminology & Classic Ciphers (Video, Slides)
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security (Video, Slides)
Readings: Cryptography, One-Time Pad, Information Theoretic Security, Stream Cipher, Pesudo-random Number Generator, Pesudo-random Number Generator, Semantic Security, Block Cipher, Block Cipher Modes of Operation, Data Encryption Standard, Advanced Encryption Standard
Feb 1 Feb 2 Feb 3 Feb 4 Feb 5: Cryptography
LEC 4: Cryptographic Hash Functions and Message Authentication Code (Video, Slides)
LEC 5: Public Key Encryption and Digital Signatures (Video, Slides)
Readings: Cryptographic Hash Function, Message Authentication Code, Public Key Cryptography, RSA, Diffie-Hellman, ElGamal, New Directions in Cryptography
Feb 8 Feb 9
Breakout Session
DUE: Quiz 1 (11:59pm CST)
Feb 10 Feb 11 Feb 12: Security Basics
LEC 6: User Authentication (Video, Slides)
Readings: Password, Password Strength, Password Cracking, Password Salts, Trusted Path, One-time Password
Feb 15 Feb 16
Breakout Session Cancelled (Weather Closing)
Feb 17 Feb 18 Feb 19
Class Cancelled (Weather Closing)
Feb 22 Feb 23
Breakout Session
Feb 24 Feb 25 Feb 26: Security Basics
LEC 7: Operating Systems Security Basics & UNIX Access Control (Video, Slides)
Readings: Section IA of The Protection of Information in Computer Systems, CPU Modes, System Call, File-system Permissions, UNIX File and Directory Permissions and Modes, Unix File Permissions
DUE: Homework 1 (11:59pm CST)
Mar 1 Mar 2
Breakout Session
Mar 3 Mar 4 Mar 5: Software Security I
LEC 8: Software Vulnerabilities (Video, Slides)
Readings: Privilege Escalation, Directory Traversal, Time-of-Check-to-Time-of-Use, Stack Buffer Overflow, Buffer Overflow Protection, Format String Attack, Integer Overflow, Smashing The Stack For Fun And Profit by Aleph One
Mar 8 Mar 9
Breakout Session
DUE: Quiz 2 (11:59pm CST)
Mar 10 Mar 11 Mar 12: Malware
LEC 9: Malwares (Video, Slides)
Readings: Malware, Computer Virus, Computer Worm, Botnet, Spyware, Rootkit
Tutorial: Project 1 (Video, Slides)
DUE: Homework 2 (11:59pm CST)
Mar 15
Spring Break
Mar 16
Spring Break
Mar 17
Spring Break
Mar 18
Spring Break
Mar 19
Spring Break
Mar 22 Mar 23
Breakout Session
Mar 24 Mar 25 Mar 26
Mid-term Exam (72 hrs from 0am CST)
Mar 29 Mar 30
Breakout Session
Mar 31 Apr 1 Apr 2: Software Security II
LEC 10: Software Security Analysis (Video, Slides)
Readings: Basic Block, Control-Flow Graph, Dependency Graph, Call Graph, Static Program Analysis, Dynamic Program Analysis, Fuzzing, Taint Checking
Tutorial: Project 2 (Video, Slides)
DUE: Project 1 (11:59pm CST)
Apr 5 Apr 6
Breakout Session
Apr 7 Apr 8 Apr 9: Web Security
LEC 11: Web Security (Video, Slides)
Readings: HTTP Cookie, Same Origin Policy, Cross Site Scripting, Cross Site Request Forgery, SQL Injection
Apr 12 Apr 13
Breakout Session
Apr 14 Apr 15 Apr 16
Lecture Cancelled
Tutorial: Project 3 (Video, Slides, PHP)
DUE: Project 2 (extended to Apr 18 11:59pm CST)
Apr 19 Apr 20
Breakout Session
Apr 21 Apr 22 Apr 23: Secure Communication, Malware Defense & Secure Software
LEC 12: Key Distribution & Agreement, Secure Communication (Video, Slides)
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software (Video, Slides)
Readings: Needham-Schroeder Protocol, Public Key Certificate, Transport Layer Security, HTTPS
Apr 26 Apr 27
Breakout Session
Apr 28
DUE: Quiz 3 (11:59pm CST)
Apr 29 Apr 30: Access Control Models and Data Privacy
LEC 14: Access Control Models (Video, Slides)
LEC 15: Data Privacy (Video, Slides)
Readings: Discretionary Access Control, Confused Deputy, Bell-LaPadula Model, Looking Back at the Bell-La Padula Model, Non-interference, Security Policies and Security Models, Biba Model, Security Models and Information Flow, k-anonymity, l-diversity, t-closeness
May 3
DUE: Project 3 (11:59pm CST)
May 4
Breakout Session
May 5
DUE: Quiz 4 (11:59pm CST)
May 6 May 7: Trusted Computing
LEC 16: Trusted Computing (Video, Slides)
Readings: Trusted Computing Base, Trusted Computing, Microkernel, Hypervisor, Trusted Platform Module, Trusted Execution Environment, Intel SGX Explained, ARM TrustZone Explained
May 10 May 11-12
Final Exam (48 hrs from May 11 0am CST)
May 13 May 14
DUE: Homework 3 (optional, 11:59pm CST)