DATES | TOPIC | Assignments Due |
---|---|---|
Tuesday, 8/27/2019 |
Introduction to the Course |
Anderson, Ch. 1
|
Thursday, 8/29/2019 |
Threat Modeling |
Read the beginning of each chapter, skim the rest of the chapter: “ThreatModeling,” by Adam Shostack, Introduction, Chapter 1, Chapter 4 Optional: Schneier, Chapter 21 |
Tuesday, 9/3/2019 | Introduction to Linux | Google Cloud Platform (GCP) | |
Thursday, 9/5/2019 |
Introduction to Cryptography |
|
Tuesday, 9/10/2019 |
Symmetric Cryptography |
Quiz: Anderson, Ch. 5, pp. 129-149 (2nd ed.); pp. 138–156 (3rd ed.). |
Thursday, 9/12/2019 |
Asymmetric Cryptography |
|
Tuesday, 9/17/2019 |
Begin Milestone 1: Threat model Crypto Wars |
Lab: Symmetric Cryptography |
Thursday, 9/19/2019 |
Digital Certificates and PKI |
Lab: Asymmetric Cryptography |
Tuesday, 9/24/2019 |
Authentication and Passwords |
2nd edition: Anderson Ch. 2, pp. 31-39, 56-58 Or: 3rd edition: Anderson Ch. 3, pp. 90-97 (section 3.4–3.4.4.2)-, pp. 105-110 (section 3.4.9–3.4.12) |
Thursday, 9/26/2019 |
Password Cracking |
Lab: Digital Certificates and PKI Gosney, “How LinkedIn’s password sloppiness hurts us all“ Goodin, “Why passwords have never been weaker” Quiz: Goodin, “Why passwords have never been weaker” |
Tuesday, 10/1/2019 |
Introduction to networking |
Milestone 1: Threat Model due |
Thursday, 10/3/2019 |
Vulnerability Scanning |
Lab 5: Password Cracking |
Tuesday, 10/8/2019 |
Vulnerability Exploitation |
|
Thursday, 10/10/2019 |
Exploitation demonstration |
Lab: Vulnerability Scanning |
Tuesday, 10/15/2019 |
Begin Milestone 2: Penetration test Milestone group workday |
Lab: Exploitation |
Thursday, 10/17/2019 |
Milestone group workday |
|
Tuesday, 10/22/2019 |
Physical security |
Quiz: Anderson, Chapter 11 |
Thursday, 10/24/2019 |
The Human Element of Security |
Online video: Bruce Schneier, The Security Mirage “Cosmo, the Hacker ‘God’ Who Fell to Earth,” by Mat Honan. |
Tuesday, 10/29/2019 | Milestone group workday |
Milestone 2: Penetration test report draft due |
Thursday, 10/31/2019 |
Network Security Monitoring and Incident Response |
“Network Security Monitoring,” by Richard Bejtlich, Chapter 1 Lab: Physical Security |
Tuesday, 11/5/2019 | Information Security in Organizations |
Lab: Social Engineering |
Thursday, 11/7/2019 |
Information Privacy |
Tim Cook, “Technology can harm, can help” |
Tuesday, 11/12/2019 |
Risk case study: Equifax |
Quiz: “Citizenfour” film Quiz: Equifax case |
Thursday, 11/14/2019 |
Risk assessment |
|
Tuesday, 11/19/2019 |
Malware Analysis |
Milestone 3: Penetration test report due Quiz: Introduction and Chapter 0 of Practical Malware Analysis by Sikorski and Honig. Quiz: “Zero Days” film |
Thursday, 11/21/2019 | Risk case study: Maersk |
Quiz: Maersk case Lab: Online Privacy |
Saturday, 11/23/2019 |
Milestone 4: Risk assessment report draft |
|
Tuesday, 11/26/2019 |
Fall break, no class |
|
Thursday, 11/28/2019 |
Thanksgiving, no class |
|
Tuesday, 12/3/2019 |
Milestone report workday |
Lab: Malware Analysis |
Thursday, 12/5/2019 |
Course wrap-up |
|
Monday, 12/9/2019 |
|
Milestone 5: Final risk assessment report due Book report due Extra credit film, book reports due Optional: Lab: Network Security Monitoring due |
Thursday, 12/12/2019 |
Final exam period begins |
|
Wednesday, 12/18/2019 |
Last day of final exams |
|