Föreläsningar
Project Teachers: Ben Smeets
The lectures will be on-line (to start with). New instructions may follow. For zoom link see course canvas
- 
Wednesday: 15.15-17.00:
- 
Friday: 13.15-15.00:
See also TimeEdit
Material will be updated as course proceeds. Except Intro slides are protected.
| Date | Planned Content | Link | New | 
| 1/9 | Introduction, Forensics: self study C Altheide(video), | 3/9 | |
| 3/9 | walkthrough of quiz preparation, Forensics finish, Crypto applied, Ways of Encryption , Perfect Foward Secrecy, Object security, | Lect2 | |
| 8/9 | Network security: AAA, Securing communication, TLS, IPsec | Lect2 cont'd | 
 | 
| 10/9 | Network security: Project B,IoT, GSM, LTE, DDOS, botnets | 
 | |
| 15/9 | Trused computing: General concepts, What are the challenges, Roots of Trust, | Lect4 | |
| 17/9 | Platform security: TPM | Lect 4, contd | 
 | 
| 22/9 | NO LECTURE | 
 | 
 | 
| 24/9 | Platform security: TPM fort, UEFI, Intel TXT, Trusted Computing Pools, TEE, Project C | Lect5 | 
 | 
| 29/9 | SGX,ARM TrustZone | Lect6 | |
| 1/10 | EPID, ARM TrustZone, HSM, Smartcards (self-study), NFC | Lect7 | |
| 6/10 | PUFFs, Virtualization, SELinux, Java, Containers, Android, iOS, BYOD | 9/10 | |
| 8/10 | Homomorphic encryption, Database operations on encrypted data, Cloud computing, Secure VM launch | Lect9 |  13/10 | 
| 13/10 | Finalyzing cloud computing. Security and Economics, DRM, Block chain, Software Security: ROP attack, SW design, writing and analysis, | Lect11 | |
| 15/10 | Cont SW design, Project E: Common Criteria, EAL2 | Lect10,ProjectE, | 
If you want to have the course slides in the format of one slide per page you can find these by using the existing links modified as follows. Replace .../Lectures/Lectn_slides.pdf by .../Lectures/Lectn_slides_1P.pdf where n is the lecture number.