Dates | Topic & Assignments Due | Readings |
---|---|---|
Tuesday, 8/24/2020 |
Introduction to the Course |
Anderson, Ch. 1
|
Thursday, 8/27/2020 |
Risk Assessment |
|
Tuesday, 9/1/2020 |
Threat modeling Start Milestone 1: Risk Assessment |
Read the beginning of each chapter, skim the rest of the chapter: “Threat Modeling,” by Adam Shostack, Introduction, Chapter 1, Chapter 4 Optional: Schneier, Chapter 21 |
Thursday, 9/3/2020 |
Information Privacy |
Tim Cook, “‘Technology can harm, can help” |
Tuesday, 9/8/2020 | Introduction to Linux | Google Cloud Platform (GCP) | |
Thursday, 9/10/2020 |
Information Privacy Lab due Information Security in Organizations |
|
Tuesday, 9/15/2020 |
Introduction to Google Cloud Platform and Linux Tutorial Lab due Introduction to Cryptography
|
|
Thursday, 9/17/2020 |
Milestone 1: Risk Assessment Draft due Symmetric Cryptography |
Anderson, Ch. 5, pp. 140–148, 153–155. |
Tuesday, 9/22/2020 |
Symmetric Cryptography, continued |
|
Thursday, 9/24/2020 |
Asymmetric Cryptography |
|
Tuesday, 9/29/2020 |
Digital Certificates and PKI |
Anderson Ch. 3, pp. 97-103, 113–118 (section 3.4–3.4.4.2, 3.4.9–3.4.12) |
Thursday, 10/1/2020 |
Symmetric Cryptography Lab due Authentication and Passwords |
|
Tuesday, 10/6/2020 |
Asymmetric Cryptography Lab due Password Cracking |
Gosney, “How LinkedIn’s password sloppiness hurts us all“ Goodin, “Why passwords have never been weaker“ |
Thursday, 10/8/2020 |
Digital Certificates lab due Introduction to networking |
|
Friday, 10/9/2020 |
Milestone 2 Final Risk Assessment Report due |
|
Tuesday, 10/13/2020 |
Midterm exam opens Vulnerability Scanning |
|
Thursday, 10/15/2020 |
Password cracking lab due Vulnerability Exploitation |
|
Saturday, 10/17/2020 |
Midterm exam due |
|
Tuesday, 10/20/2020 |
Vulnerability scanning lab due Exploitation demonstration |
|
Thursday, 10/22/2020 |
Milestone 3 penetration test begins Milestone group workday |
|
Saturday, 10/24/2020 |
Vulnerability exploitation lab due |
|
Tuesday, 10/27/2020 |
Physical security |
|
Thursday, 10/29/2020 |
The Human element of security |
Online video: Bruce Schneier, The Security Mirage “Cosmo, the Hacker ‘God’ Who Fell to Earth,” by Mat Honan. Anderson, Chapter 2, pp. 89–95; Chapter 13 |
Tuesday, 11/3/2020 |
Network Security Monitoring |
“Network Security Monitoring,” by Richard Bejtlich, Chapter 1 |
Thursday, 11/5/2020 |
Milestone 3 penetration test draft due Incident Response |
|
Tuesday, 11/10/2020 |
Malware Analysis |
Introduction and Chapter 0 of Practical Malware Analysis by Sikorski and Honig. |
Thursday, 11/12/2020 |
Respond case study: Equifax |
Harvard case: “Data Breach at Equifax,” Srinivasan et al. |
Tuesday, 11/17/2020 |
Social Engineering Lab due Recover case study: Maersk |
“The Untold Story of NotPetya,” by Andy Greenberg |
Thursday, 11/19/2020 |
Milestone group work time |
|
Tuesday, 11/24/2020 | Fall Break (no class) | |
Thursday, 11/26/2020 |
Fall Break (no class) |
|
Tuesday, 12/1/2020 |
Milestone group work time |
|
Thursday, 12/3/2020 |
Course wrap-up |
|
Monday, 12/7/2020 |
Final Milestones 4-5 Report due Malware analysis lab due Network security monitoring lab due |
|
Thursday, 12/10/2020 |
Final exam period begins |
|
Wednesday, 12/16/2020 |
Last day of final exams |
|