Date |
Topic |
Readings |
Jan 9 |
No class |
|
Jan 11 |
Introduction and Administrivia |
Course policies, Plagiarism
|
Jan 13 |
No lab
|
Jan 16 |
Martin Luther King Jr. Day
No class, consider attending these events: Martin Luther King,
Jr. Celebration 2017, Jan 12–16th
|
|
Jan 18 |
What is security?
|
SB Ch. 1.1–1.3
|
Jan 20 |
Lab 1: Linux Installation Lab
|
Jan 23 |
Concepts in security design |
SB Ch. 1.1–1.3
|
Jan 25 |
Introducing the Access Control Matrix
|
SB Ch. 4.1–4.4
|
Jan 27 |
Lab 2: Access Control in UNIX
|
Jan 30 |
Access Control in UNIX
|
SB Ch. 4.1–4.4
|
Feb 1 |
Advanced Concepts in Access Control
|
SB Ch. 4.1–4.4
|
Feb 3 |
No Lab: Office Hours in Lab
|
Feb 6 |
Advanced Concepts in Access Control
|
SB Ch. 4.1–4.4
|
Feb 8 |
Databases and SQL — Intro
|
SB Ch. 5.1–5.5
|
Feb 10 |
Lab 3: Advanced Access Control in UNIX
|
Feb 13 |
Databases and SQL — SQL Demo
|
SB Ch. 5.1–5.5
|
Feb 15 |
Databases and SQL — SQL Injection
|
SB Ch. 5.1–5.5
|
Feb 17 |
No Lab: Office Hours in Lab
|
Feb 19 |
Paper Proposal Due
|
Feb 20 |
Databases and SQL — SQL Injection Defenses
|
SB Ch. 5.1–5.5
|
Feb 22 |
Databases and SQL — Access Control
|
SB Ch. 5.1–5.5
|
Feb 24 |
Lab 4: SQL Injection Lab
|
Feb 27 |
Symmetric Cryptography — Intro
|
SB Ch. 2.1–2.2
|
Mar 1 |
Symmetric Cryptography — One Time Pads
|
SB Ch. 20.5
|
Mar 3 |
No Lab: Office Hours in Lab
|
Mar 6 |
Symmetric Cryptography — One Time Pads
|
SB Ch. 2.1–2.2, 20.5, Supplemental Reading
|
Mar 8 |
Symmetric Cryptography — Block Ciphers
|
SB Ch. 2.1–2.2, 20.5, Supplemental Reading
|
Mar 10 |
Lab 5: SQL Injection Defense Lab
|
Mar 13 |
Spring Break, no class |
Mar 15 |
Spring Break, no class |
Mar 20 |
Symmetric Cryptography — MACs
|
SB Ch. 2.1–2.2, 20.5, Supplemental Reading
|
Mar 22 |
Asymmetric Cryptography: Encryption
|
SB Ch. 2.3–2.5
|
Mar 24 |
No Lab: Office Hours in Lab
|
Mar 27 |
Asymmetric Cryptography: Key Exchange Problem
|
SB Ch. 2.3–2.5
|
Mar 29 |
Asymmetric Cryptography: Key Sizes
|
SB Ch. 2.3–2.5
|
Mar 31 |
No lab this week. Work on research paper
|
Apr 3 |
Asymmetric Cryptography: Signatures, Hash Functions
|
SB Ch. 2.3–2.5
|
Apr 5 |
Asymmetric Cryptography: Signatures, Hash Functions
|
SB Ch. 2.3–2.5
|
Apr 7 |
Lab 6: Asymmetric Cryptography
|
Apr 10 |
Asymmetric Cryptography: Certificates and PKI
|
SB Ch. 2.3–2.5
|
Apr 12 |
Security Development Lifecycle: Best Practices
|
SDL Ch. 7
|
Apr 14 |
No Lab
|
Apr 17 |
Security Development Lifecycle: Risk Assessment
|
SDL Ch. 8
|
Apr 19 |
Security Development Lifecycle: Risk Analysis
|
SDL Ch. 9
|
Apr 21 |
Final Term Paper Presentations During Afternoon Lab
("3-Minute Madness")
|
|
|
Sun, Apr 23 |
Final Term Paper Due
|
Apr 24 |
Security Development Lifecycle leftovers
|
|
Apr 26 |
Final Exam Review Session
|
|
Apr 28 |
No lab assignments: treat as AI office hours
|
May 5 |
Closed-book, Comprehensive Final Exam
Covers Entire Syllabus (all readings and labs)
10:15am–12:15pm, Ballantine Hall 232 |