Lectures
Lectures: 28 hours
Time and place:
See below
2018 Lectures:
A zip of the lectures from 2018 can be found here, but several lectures will change this year since we use a new book. It is your own responsibility to make sure that you look at the 2019 lectures when studying for the exam or doing home assignments.
Schedule 2019: (This should align exactly with TimeEdit)
Date | Location | Content | Chapter | Slides |
21/1, 13-15 | MA:6 | Introduction, Terminology | 1.1-1.4, 1.6 | pdf, pdf_Big |
24/1, 13-15 | MA:6 | Cryptographic Tools, part 1 | 2.1-2.2, 20.1, 20.5 | pdf, pdf_Big |
25/1, 10-12 | MA:6 | Cryptographic Tools, part 2 | 2.3-2.4, 21.4 | ^ |
28/1, 13-15 | MA:6 | User Authentication | 3.1-3.4 | pdf, pdf_Big |
30/1, 8-10 | MA:6 | Access Control | 4.1-4.3, 4.5-4.6 | pdf, pdf_Big |
31/1, 13-15 | MA:6 | Windows Security | 26.1 | pdf, pdf_Big |
4/2, 13-15 | MA:6 | Linux Security | 25.1-25.3 | pdf, pdf_Big |
8/2, 10-12 | MA:6 | Key Establishment and Remote Authentication | 21.5, 23.1 | pdf, pdf_Big |
11/2, 13-15 | MA:6 | Internet Security Protocols | 22.3-22.5 | pdf, pdf_Big |
18/2, 13-15 | MA:6 | Intrusion Detection and Firewalls | 8.1-8.6, 8.8, 9.1-9.3 | pdf, pdf_Big |
22/2, 10-12 | MA:6 | Buffer overflows and SQL injections | 10.1-10.2 | pdf, pdf_Big |
25/2, 13-15 | MA:6 | Security models | 27.1-27.2 | pdf, pdf_Big |
1/3, 10-12 | MA:6 | Guest Lectures: Security at Axis, Meltdown/Spectre | ||
4/3, 13-15 | MA:6 | Mobility | pdf, pdf_Big |