| Number | Title | Materials |
|---|---|---|
| 1 | Introduction | slides |
| 2 | Vulnerabilities | slides |
| 3 | More Vulnerabilities | slides |
| 4 | Exploit Defenses | slides |
| 5 | Intro to Networking | slides |
| 6 | TCP | slides |
| 7 | Portscanning | slides |
| Guest | Software Defined Networking | slides |
| 8 | Portscanning and Worms | slides |
| 9 | Worms and Firewalls | slides |
| 10 | Firewalls and DDOS | slides |
| 11 | DDOS and NIDS | slides |
| 12 | NIDS | slides |
| 13 | NIDS and HTTP | slides |
| Guest | IT Security @ Cornell | slides |
| 14 | More HTTP and NIDS | slides |
| 15 | Web Attacks | slides |
| 16 | Web Client Attacks | slides |
| 17 | Web Client Attacks and Proxies | slides |
| 18 | Web Application Attacks | slides |
| 19 | Finishing Web, Symmetric Cryptography | slides |
| 20 | Symmetric and Public Key Cryptography | slides |
| 21 | TLS | slides |