Number | Title | Materials |
---|---|---|
1 | Introduction | slides |
2 | Vulnerabilities | slides |
3 | More Vulnerabilities | slides |
4 | Defenses Against Vulnerabilities | slides |
5 | Intro to Networking | slides |
6 | Intro to TCP | slides |
7 | Port Scanning | slides |
8 | Port Scanning and Scanning Worms | slides |
9 | Worms and Firewalls | slides |
10 | Firewalls and DDOS | slides |
11 | More Firewalls and DDOS | slides |
12 | Network Intrusion Detection | slides |
13 | More Network Intrusion Detection | slides |
14 | HTTP and Network Intrusion Detection | slides |
15 | More HTTP and Network Intrusion Detection | slides |
16 | Guest Lecture: Cornell IT Security Office | slides |
17 | Javascript and Web Client Attacks | slides |
18 | Javascript and Web Client Attacks | slides |
19 | Web Proxies | slides |
20 | Finishing Web | slides |
21 | Symmetric Encryption | slides |
Guest | Guest Lecture: Digital Forensics | slides |
22 | More Encryption | slides |
23 | TLS | slides |
24 | More TLS and Course Review | slides |