Check this
webpage each week to keep track of any change in the schedule
Weeks |
Reading
Assignment |
Examination/Project |
1 Aug 17 -
23 |
Chapter 1: Overview Chapter 2: Cryptographic Tools |
|
2 Aug 24 -
30 |
Chapter 3: User Authentication Chapter 4: Access Control |
|
3 Aug 31 -
Sept 6 |
Chapter 5: Intrusion Detection Chapter 6: Malicious Software |
|
4 Sept 7
- 13 |
Chapter 8: Denial of Service Chapter 9: Firewalls |
|
5 Sept 14
- 20 |
Chapter 10: Trusted Computing Chapter 11: Buffer Overflow |
|
6 Sept 21
- 27 |
Chapter 12: Software Security Chapter 13: Physical Security |
|
7 Sept 28
- Oct 4 |
Review of Chapters 1 -13 |
|
8 Oct 2 -
6 |
*************************************** |
Midterm |
9 Oct 12 -
18 |
Chapter 14: Human Factors Chapter 15: Security Auditing |
|
10 Oct 19 -
25 |
Chapter 16: IT Management and Risk Assessment Chapter 18: Legal and Ethical Aspects |
|
11 Oct 16 –
Nov 1 |
Chapter 19: Symmetric Key Encryption and Message
Confidentiality |
|
12 Nov 2 -
8 |
Chapter 20: Public Key Cryptography and Message
Authentication |
|
13 Nov 9 -
15 |
Chapter 21: Internet Security
Protocols and Standards Chapter 22: Internet
Authentication Applications |
|
14 Nov 16 -
22 |
Chapter 23: Linux Security Chapter 24: Windows Security |
|
15 Nov 23 –
Dec 7 |
Review: Chapters 1- 24 Final Project/Research |
|