Lectures
(Note this is a rough schedule. Please check for updates.)
-
-
-
-
Lec1_Overview.pptx
This lecture will give a high-level overview of the course, including topics covered, learning goals, and course mechanics. Reading:
Introduction and Course Overview
|
-
Lec2_Net_Sec_Refresher.pptx
This lecture will be a quick refresher of basic networking and security concepts for the class
Networking and Security Review
|
-
TBD
No class
-
Lec3_TCPIP.pptx
This lecture will cover classic attacks on the TCP/IP protocol suite Reading:
TCP/IP attacks
|
-
Lec4_BGP.pptx
This lecture will cover different types of routing attacks and defenses Reading:
Routing Security
|
-
Lec5_IPSEC_SSL.pptx
This lecture will cover topics like IPSEC/SSL as well as some proposed extensions to these Reading:
Cryptographic primitives
|
-
Lec6_SDN.pptx
This lecture will give a high-level overview of SDNs and potential security challenges and opportunities with SDN Reading:
SDN and security
|
-
Lec8_NIDS.pptx
This lecture will cover basics of network-based intrusion detection and prevention systems, their designs, and potential security weaknesses Reading:
NIDS and NIPS
|
-
Lec7_ProjectOverview.pptx
We will go through candidate project ideas and mechanisms of the class project Reading:
Project Discussion
|
-
Lec9_Verification.pptx
This lecture will cover some emerging topics in the area of network verification and testing Reading:
Testing and verification
|
-
Lec10_DDoS.pptx
This lecture will cover DoS/DDoS attacks and defenses Reading:
Denial of service attacks
|
-
Lec12_Worms.pptx
This lecture will cover the basics of "Worm" attacks, defenses, and damages they can cause Reading:
Worms
|
-
Lec12_AttackGraph.pptx
This lecture will introduce the concept of attack graphs and attack surface modeling Reading:
Attack and threat models
|
-
Midterm exam
In class midterm
-
No class
-
No class
-
Lec13_DNS.pptx
This lecture will cover problems with DNS and some proposals to fix these issues in DNS Reading:
DNS security
|
-
Lec14_Anonymity.pptx
This lecture will cover anonymous communications with a specific focus on ToR Reading:
Network layer anonymity
|
-
Lec15_Censorship.pptx
This lecture will cover basics of censorship techniques, as well as techniques to measure and evade censoring tools Reading:
Censorship
|
-
Lec17_SideChannels.pptx
This lecture will cover side channels and traffic analysis techniques in network security. Reading:
Side channels
|
-
We will use this lecture to have each group present a project milestone to the class
Project pitch and milestone
-
Lec18_Forensics.pptx
This lecture will cover different aspects of network forensics in enterprises and wide-area settings. Reading:
Network forensics
|
-
Lec21_Cybercrime.pptx
This lecture will cover some of the economic aspects of network security threats and how these play a role Reading:
Economic aspects
|
-
Lec22_NextGen.pptx
This lecture will cover some emerging proposals for security in future Internet architectures Reading:
Next Generation Networks
|
-
Lec24_Wireless.pptx
This last set of lectures will cover emerging topics in network security such as IoT, Blockchains, and use of machine learning. (Topics and readings to be posted soon)
Special topics/Guest Lectures
|
-
Lec24_Wireless.pptx
This last set of lectures will cover emerging topics in network security such as IoT, Blockchains, and use of machine learning. (Topics and readings to be posted soon)
Special topics/Guest Lectures
|
-
Lec24_Wireless.pptx
This last set of lectures will cover emerging topics in network security such as IoT, Blockchains, and use of machine learning. (Topics and readings to be posted soon)
Special topics/Guest Lectures
|
-
Lec24_Wireless.pptx
This last set of lectures will cover emerging topics in network security such as IoT, Blockchains, and use of machine learning. (Topics and readings to be posted soon)
Special topics/Guest Lectures
|
-
We will use this lecture to have each group present a project milestone to the class
Project pitch and milestone
-
Final Exam!
In class final