Lectures
The lectures will follow the course book, Computer Security, third edition, by D. Gollman. You will have to order the book yourself so it is a good idea to do it as soon as possible if you want it.
Lectures: 28 hours
Time and place:
See below
For exchange students:
Lectures will be in Swedish. It is possible to meet with Martin once per week and discuss the lectures from the previous week. This meeting will last for approximately 1 hour.
2014 Lectures:
A zip of the lectures from 2014 can be found here. You can look at them if you want to read ahead, but some lectures will not be identical to the ones 2015. It is your own responsibility to make sure that you look at the 2015 lectures when studying for the exam. (though the differences are probably small).
Preliminary schedule 2015:
Date | Location | Content | Chapter | Slides |
19/1, 13-15 | MA:07 | Introduction, Foundations of Computer Security | 2,3 | |
22/1, 10-12 | Kår:Hör | Cryptography, Digital Certificates, part 1 | 14, 15.5 | |
23/1, 10-12 | Kår:Hör | Cryptography, Digital Certificates, part 2 | 14, 15.5 | ^ |
26/1, 13-15 | MA:07 | Identification & Authentication | 4 | |
29/1, 10-12 | Kår:Hör | Access Control, Reference Monitors | 5,6 | |
2/2, 13-15 | MA:07 | Windows Security | 8 | |
5/2, 10-12 | Kår:Hör | Unix Security | 7 | |
9/2, 13-15 | MA:07 | Security Eval, Key Establishment | 13, 15 | pdf, pdf |
16/2, 10-12 | MA:07 | Key Establishment cont'd, Communications Security | 15, 16 | |
19/2, 10-12 | Kår:Hör | Communications Security cont'd, Network Security | 16, 17 | ^ |
23/2, 13-15 | MA:07 | Software Security | 10 | |
26/2, 10-12 | Kår:Hör | Bell-LaPadula Model, Security Models | 11,12 | |
2/3, 13-15 | MA:07 | Guest lecture: Stuxnet, malware deluxe | ||
5/3, 10-12 | Kår:Hör | Mobility | 19 |