Course Home Lectures Assignments Submitting Homework

COMS W4180 — Network Security: Lectures

Sep-05-06
Session 1: Introduction
Sep-07-06
Session 2: Threats and Attacks
Reading:
Chapter 1 of Kaufman et al.
Chapter 1 of Cheswick et al.
Sep-12-06
Session 3: Introduction to Cryptography
Reading:
Chapters 4-6 of Kaufman et al.
Appendix A of Cheswick et al. or section 13.1 of that part of the first edition.
Sep-14-06
Session 4: Public key; hash functions; MACs

Reading:

Sep-19-06
Session 5: MACs, authentication, certificates
Reading:
Robert H. Morris and Ken Thompson, Password security: a case history, Communications of the ACM 22:11, November 1979
Sep-21-06
Session 6: Key exchange protocols; Kerberos

Readings:

Sep-26-06
Session 7: SSL (slides courtesy of Prof. Angelos Keromytis)

Reading:
Chapter 19 of Kaufman et al.

Sep-28-06
Session 8: Web Security

Readings:

Oct-03-06
Session 9: Email security

Readings:

Oct-05-06
Session 10: IPsec

Reading:
Chapter 17 of Kaufman et al.

Oct-10-06
Session 11: IPsec key management: IKE

Reading:
Chapter 18 of Kaufman et al.

Oct-12-06
Session 12: SSH

Readings:

Oct-17-06
Session 13: SIP and VoIP

Reading:
Section 26 of RFC 3261

Oct-19-06
Session 14: Networked Storage

Readings:

Oct-24-06
Session 15: Firewalls

Readings:

Oct-26-06
Session 16: Firewalls

Readings:

Oct-31-06
Session 17: Midterm

Grade histogram uploaded to Courseworks
Nov-02-06
Session 18: Scanning

Reading:

The nmap man page (available on the CLIC machines)
Nov-09-06
Session 19: Intrusion Detection Systems

Nov-14-06
Session 20: IDS: Practical issues

Readings:

Nov-16-06
Session 21: Worms

Readings:

Nov-21-06
Session 22: Denial of Service Attacks

Readings:

Nov-28-06
Session 23: Routing Security

Nov-30-06
Session 24: Wireless Security

Readings:

Dec-05-06
Session 25: Privacy

Readings:

Dec-07-06
Session 26: Review