Date |
Topic |
Reading |
Quiz |
Notes |
Lab |
Aug 26 |
Fundamentals |
- 5 Cybersecurity Threats for 2020
- Learning the Shell
|
|
- Introduction
- Fundamentals
|
Command Line Basics |
Sep 02 |
Access Control and Environment Variables |
- Du, chapters 1 and 2
- Compiling a C program
- Memory Layout of a C Program
- Advanced Linux Programming, pages 45-51
|
1 |
AccessControl |
Environment and SetUID |
Sep 09 |
Input Validation and the Shellshock Attack |
- Du, chapter 3
- Input Validation Cheatsheet
- Stack vs Heap Memory Allocation
|
2 |
InputValidation |
Shellshock Attack |
Sep 16 |
Buffer Overflows |
- Du, chapter 4
- Introduction to Memory Unsafety for VPs of Engineering
- Secure Coding in C and C++, 2nd Edition, Chapter 2 (reference)
|
3 |
Buffer-Overflows |
Buffer Overflow |
Sep 23 |
Format Strings and Integer Security |
- Du, chapter 6
- Programming Language Format String Vulnerabilities
- Integer Overflow
|
4 |
- FormatStrings
- IntegerSecurity
|
Format String |
Sep 30 |
Race Conditions and Web Security |
- Du, chapter 7
- A Security-Focused Introduction to HTTP
- HTTP Cookies
|
5 |
- RaceConditions
- HTTPsecurity
|
Race Condition |
Oct 07 |
Authentication and Cross Site Request Forgery (CSRF) |
- Du, chapter 10
- Your Password Doesn't Matter
- Why passwords have never been weaker and crackers have never been stronger
- Anatomy of a hack: How crackers ransack passwords like "qeadzcwrsfxv1331"
- What is CSRF?
|
6 |
Authentication |
CSRF Attack |
Oct 14 |
Cross-Site Scripting (XSS) and Election Security |
- Du, chapter 11
- A Brief History of Voting
- The Crisis of Election Security
- Online voting is a cybersecurity nightmare
- Economics of Hacking an Election
|
7 |
- CrossSiteSecurity
- ElectionSecurity
|
Cross-Site Scripting Attack |
Oct 21 |
Injection Attacks and Surveillance |
- Du, chapter 12
- What is SQL Injection
- Don't Panic: Making Progress on the "Going Dark" Debate (pages 1-15)
- Keys Under Doormats
- SQL Zoo (reference)
|
8 |
Injection |
SQL Injection |
Oct 28 |
Packet Sniffing and TCP/IP |
- Du, chapters 15 and 16 (ignore C code)
- TCP/IP Model
- How TCP Works
- Scapy Tutorial p. 01, 03-05
- An Introduction to Computer Networks, chapters 7 and 12 (reference)
|
9 |
NetworkSecurity |
Packet Sniffing and Spoofing |
Nov 04 |
Firewalls and NIDS |
Du, chapter 17 (skip section 17.3) |
10 |
- TCP-UDP-Security
- FirewallsNIDS
|
TCP Attacks |
Nov 11 |
DNS and Security Protocols |
- Du, chapter 18 (skip sections 18.7-9)
- Du, chapter 19.1-2
- Anderson, chapter 4
|
11 |
SecurityProtocols |
Local DNS Attacks |
Nov 18 |
Secret Key Cryptography and Hash Functions |
- Du, chapters 21 and 22 (ignore C code)
- Why Google is Hurrying the Web to Kill SHA-1
- New SHA-1 Collision Attack
|
12 |
HashFunctions |
Secret Key Encryption |
Dec 02 |
Public Key Cryptography |
- Du, chapters 23 and 24
- Is Encryption Doomed?
- Securing a CA root certificate
|
13 |
- PublicKeyCryptography
- PublicKeyInfrastructure
|
Public Key Infrastructure |
Dec 09 |
Transport Layer Security and Blockchain |
- Du, chapter 25 (skip sections 25.4 and 25.6)
- Du, chapter 26
- TLS Deployment Best Practices (reference)
- Ethereum is a Dark Forest
- Why Bitcoin is destined to become a niche asset
|
14 |
- TransportLayerSecurity
- Cryptocurrencies
|
|
- |
Dec 15 |
Final Exam () |
|
|
|
|