Modules
Note that course materials are only available via LEARN.
Module - Introduction to Computer Security and Privacy
- Jan 05
- Lecture: Course logistics
- Lecture: The basis of computer security and privacy
Module - Program Security
- Jan 10
- Lecture: Flaws and failures
- Jan 12
- Lecture: Malicious code
- Jan 17
- Lecture: Defenses against security flaws
- Jan 19
- InteractiveTBD
Module - Operating System Security
- Jan 24
- Lecture: Protecting OSes and access control
- Jan 26
- Lecture: User authentication
- Jan 31
- Lecture: Security policies and trusted OSes
- Feb 02
- InteractiveTBD
Module - Network Security
- Feb 07
- Lecture: Networks, Servers and Ports
- Feb 09
- Lecture: Port Scanning to Spoofing
- Feb 14
- Lecture: More Network Attacks
- Feb 16
- InteractiveTBD
Module - Internet Application Security and Privacy
- Feb 28
- Lecture: Basics of cryptography
- Mar 02
- Lecture: Link-layer security
- Lecture: Network-layer security
- Lecture: Transport-layer security and privacy
- Lecture: Network-layer security
- Mar 07
- Lecture: Application-layer security and privacy
- Lecture: Security and privacy in the IoT context
- Lecture: Security and privacy in the Blockchain context
- Lecture: Security and privacy in the IoT context
- Mar 09
- InteractiveTBD
Module - Data Security and Privacy
- Mar 14
- Lecture: Database security and privacy requirements
- Lecture: Multilevel security databases
- Mar 16
- Lecture: Security and privacy concerns in data mining
- Lecture: Protecting privacy using k-anonymity
- Lecture: Differential privacy
- Lecture: Protecting privacy using k-anonymity
- Mar 21
- Lecture: Adversarial machine learning
- Lecture: Recent progresses on machine unlearning
- Mar 23
- InteractiveTBD
Module - Non-technical Aspects of Security and Privacy
- Mar 28
- Lecture: Ethical issues
- Lecture: Administering security
- Mar 30
- Lecture: Legal issues
- Lecture: Emerging topics in security and privacy
Module - Review of Course Content
- Apr 04
- InteractiveEnd-of-course review