Lectures
Lectures: 28 hours
Time and place:
See below
2019 Lectures:
A zip of the lectures from 2019 can be found here, but note that current lectures may be updated. Make sure that you look at the 2020 lectures when studying for the exam or doing home assignments.
Schedule 2020 (This should align exactly with TimeEdit, let me know if you find any discrepancies) with preliminary (until respective lecture) content specification:
Date | Time | Location | Content | Chapter | Slides |
20/1 | 13-15 | MA:6 | Introduction, Terminology | 1.1-1.4, 1.6 | pdf, big_pdf |
23/1 | 13-15 | MA:6 | Cryptographic Tools, part 1 | 2.1-2.2, 20.1, 20.5 | pdf, big_pdf |
24/1 | 10-12 | MA:6 | Cryptographic Tools, part 2 | 2.3-2.4, 21.4 | ^ |
27/1 | 13-15 | MH:Gårdingsalen | User Authentication | 3.1-3.4 | pdf, big_pdf |
29/1 | 8-10 | MA:6 | Access Control | 4.1-4.3, 4.5-4.6 | pdf, big_pdf |
30/1 | 13-15 | MA:6 | Windows Security | 26.1 | pdf, big_pdf |
3/2 | 13-15 | MA:6 | Linux Security | 25.1-25.3 | pdf, big_pdf |
7/2 | 10-12 | MA:6 | Key Establishment and Remote Authentication | 21.5, 23.1 | pdf, big_pdf |
10/2 | 13-15 | MA:6 | Internet Security Protocols | 22.3-22.5 | pdf, big_pdf |
17/2 | 13-15 | MA:6 | Guest lecture Ernst & Young AB: Cloud Security | relates to 13 | pdf |
21/2 | 10-12 | MA:6 | Intrusion Detection and Firewalls | 8.1-8.6, 8.8, 9.1-9.3 | pdf, big_pdf |
24/2 | 13-15 | MA:6 | Software Security | 10.1-10.2, 5.4 | pdf, big_pdf |
28/2 | 10-12 | MA:6 | Security Models Database Security |
27.1-27.2, 5.1-5.3, 5.5-5.7 |
pdf, big_pdf, pdf, big_pdf |
2/3 | 13-15 | MA:6 | Mobility | 24.1-24.4 | pdf, big_pdf |