Week of | Subject | Associated Reading |
---|---|---|
1 | Security Introduction and Software | |
2 | Classical Cryptography | |
3 | Advanced/Public Key Cryptography | |
4 | Advanced Cryptography & Applications | |
5* | Threat Models | |
6 | Models of Security and Policy | |
7 | Access Control | |
8 | Intrusion Detection and Prevention | |
9* | Malicious Software and Attacks | |
10 | Software Security | |
11 | Covert Channels and Privacy | |
12 | Case Studies: Linux and Windows Security Model | |
13 | Conclusions and Presentations |