Lectures
The lectures will follow the course book, Computer Security, third edition, by D. Gollman. You will have to order the book yourself so it is a good idea to do it as soon as possible if you want it.
Lectures: 28 hours
Time and place:
See below
2016 Lectures:
A zip of the lectures from 2016 can be found here. You can look at them if you want to read ahead, but some lectures will not be identical to the ones 2017. It is your own responsibility to make sure that you look at the 2017 lectures when studying for the exam or doing home assignments (though the differences are probably small).
Preliminary schedule 2017:
Date | Location | Content | Chapter | Slides |
17/1, 13-15 | V:C | Introduction, Foundations of Computer Security | 2,3 | |
18/1, 13-15 | MA:06 | Cryptography, Digital Certificates, part 1 | 14, 15.5 | |
19/1, 13-15 | V:C | Cryptography, Digital Certificates, part 2 | 14, 15.5 | ^ |
23/1, 8-10 | V:C | Identification & Authentication | 4 | |
26/1, 13-15 | V:C | Access Control, Reference Monitors | 5,6 | |
27/1, 15-17 | V:C | Windows Security | 8 | |
31/1, 13-15 | V:C | Unix Security | 7 | |
2/2, 13-15 | V:C | Security Eval, Key Establishment | 13, 15 | |
7/2, 13-15 | V:C | Key Establishment cont'd, Communications Security | 15, 16 | |
13/2, 8-10 | V:C | Communications Security cont'd, Network Security | 16, 17 | |
14/2, 15-17 | V:C | Software Security | 10 | |
21/2, 13-15 | V:C | Bell-LaPadula Model, Security Models | 11,12 | |
22/2, 15-17 | V:C | Guest lecture: Stuxnet, malware deluxe | ||
28/2, 15-17 | V:C | Mobility | 19 |