Class Notes
Notes:
The order of topics covered or dates specified are subject to change. Any changes will be discussed in class.
Class notes will be placed here.
- Chapter 1: Introduction
- Lab 1
- PwnKit Lab
- Chapter 2: Authentication, Access Control and Cryptography
- Chapter 3: Programs and Programming
- Chapter 4: The Web - User Side
- Chapter 5: Operating Systems
Course Outline:
The course outline requires the coverage of the following topics:
- Crosscutting Concepts in Cybersecurity
- Confidentiality, integrity, availability
- Risk
- Adversarial thinking
- Systems thinking
- Software Security
- Fundamental design principles for secure software
- Security requirements and their role in system design
- Implementation issues
- Software testing
- Ethics related to development, testing and vulnerability disclosure
- Component Security
- Vulnerabilities of system components
- Component life cycle
- Connection Security
- Introduction to data communications
- Network architectures and models
- Connection and transmission attacks
- System access and authentication
- Basic cryptographic concepts
- Authentication methods
- Identity
- Attacks and mitigation measures
- Human Security
- Social engineering
- Types of social engineering attacks
- Psychology of social engineering attacks
- Awareness and understanding of security issues
- System misuse and user misbehavior
- Proper behavior under uncertainty
- Enforcement and rules of behavior
- Privacy
- Social and behavioral privacy
- Social media privacy and security
- Organizational Security
- Risk and risk management
- Secure governance and policy
- Systems administration
- Societal Security
- Cybercrime
- Cyber ethics
- The role of policy