1 Content


1.1 Review

Make sure you actually know everything outlined here,
including Bash, VMs, Containers, Git, Standard Input/Output (I/O), etc.:
../../ClassGeneral.html

1.2 Schedule and due dates

The schedule and due dates will be updated as we progress through the semester (on Canvas).
Please check back regularly for changes.

1.3 Topic outline

1.3.1 First day

Very briefly mention:

Content/Inspiration.html

1.3.2 Introduction

Content/InfoSecOverview.html

1.3.3 Cryptography

Content/IntroCryptoCaesar.html
Content/TranspositionCiphers.html
Content/AffineCipher.html
Content/SubstitutionFrequency.html
Content/OneTimePad.html
Content/CryptoMath.html
Content/AsymmetricEncryption.html
Content/ModernSymmetric.html
Content/SymmetricBlock.html
Content/SymmetricStream.html
Content/Hashing.html
Content/AppliedCryptoSystems.html
Content/DeniableForwardSecure.html

1.3.4 x86-64 asm and reverse engineering

Content/ReverseEngineering.html

1.3.5 Malware and defensive software security

Content/MaliciousSoftware.html
Content/BufferOverflow.html
Content/Databases.html
Content/DefensiveProgramming.html

1.3.6 Authentication, access controls, operating system security

Content/Authentication.html
Content/AccessControls.html
Content/Permissions.html
Content/PasswordUserGroup.html
Content/OSHardening.html
Content/Virtualization.html
Content/AppArmorSELinux.html
Content/PracticalPersonal.html
Content/FormalVerification.html

1.3.7 Historical case analyses (optional topic, if time)

Review of cases in Plfeeger book (if time)