lu.se

Elektro- och informationsteknik

Lunds Tekniska Högskola | Lunds universitet

EITA25 Datasäkerhet

Föreläsningar

2018/2019


Lectures: 28 hours

Time and place:
See below

2018 Lectures:

A zip of the lectures from 2018 can be found here, but several lectures will change this year since we use a new book. It is your own responsibility to make sure that you look at the 2019 lectures when studying for the exam or doing home assignments.

 

Schedule 2019: (This should align exactly with TimeEdit)

Date Location Content Chapter Slides
21/1, 13-15  MA:6  Introduction, Terminology 1.1-1.4, 1.6  pdf, pdf_Big
24/1, 13-15 MA:6 Cryptographic Tools, part 1  2.1-2.2, 20.1, 20.5 pdfpdf_Big
25/1, 10-12 MA:6 Cryptographic Tools, part 2 2.3-2.4, 21.4 ^
28/1, 13-15 MA:6 User Authentication 3.1-3.4  pdfpdf_Big
30/1, 8-10 MA:6 Access Control 4.1-4.3, 4.5-4.6  pdfpdf_Big
31/1, 13-15 MA:6 Windows Security 26.1  pdfpdf_Big
4/2, 13-15 MA:6 Linux Security 25.1-25.3  pdfpdf_Big
8/2, 10-12 MA:6 Key Establishment and Remote Authentication 21.5, 23.1  pdfpdf_Big
11/2, 13-15 MA:6 Internet Security Protocols 22.3-22.5  pdfpdf_Big
18/2, 13-15 MA:6 Intrusion Detection and Firewalls 8.1-8.6, 8.8, 9.1-9.3  pdf, pdf_Big
22/2, 10-12 MA:6 Buffer overflows and SQL injections 10.1-10.2  pdf, pdf_Big
25/2, 13-15 MA:6 Security models 27.1-27.2  pdf, pdf_Big
1/3, 10-12 MA:6 Guest Lectures: Security at Axis, Meltdown/Spectre    
4/3, 13-15 MA:6 Mobility   pdf, pdf_Big