| Number | Title | Materials |
|---|---|---|
| 1 | Introduction | slides |
| 2 | Vulnerabilities | slides |
| 3 | More Vulnerabilities | slides |
| 4 | Defenses Against Vulnerabilities | slides |
| 5 | Intro to Networking | slides |
| 6 | Intro to TCP | slides |
| 7 | Port Scanning | slides |
| 8 | Port Scanning and Scanning Worms | slides |
| 9 | Worms and Firewalls | slides |
| 10 | Firewalls and DDOS | slides |
| 11 | More Firewalls and DDOS | slides |
| 12 | Network Intrusion Detection | slides |
| 13 | More Network Intrusion Detection | slides |
| 14 | HTTP and Network Intrusion Detection | slides |
| 15 | More HTTP and Network Intrusion Detection | slides |
| 16 | Guest Lecture: Cornell IT Security Office | slides |
| 17 | Javascript and Web Client Attacks | slides |
| 18 | Javascript and Web Client Attacks | slides |
| 19 | Web Proxies | slides |
| 20 | Finishing Web | slides |
| 21 | Symmetric Encryption | slides |
| Guest | Guest Lecture: Digital Forensics | slides |
| 22 | More Encryption | slides |
| 23 | TLS | slides |
| 24 | More TLS and Course Review | slides |