| Week of | Subject | Associated Reading |
|---|---|---|
| 1 | Security Introduction and Software | |
| 2 | Classical Cryptography | |
| 3 | Advanced/Public Key Cryptography | |
| 4 | Advanced Cryptography & Applications | |
| 5* | Threat Models | |
| 6 | Models of Security and Policy | |
| 7 | Access Control | |
| 8 | Intrusion Detection and Prevention | |
| 9* | Malicious Software and Attacks | |
| 10 | Software Security | |
| 11 | Covert Channels and Privacy | |
| 12 | Case Studies: Linux and Windows Security Model | |
| 13 | Conclusions and Presentations |