Tentative Schedule (Subject to Change)

 

Check this webpage each week to keep track of any change in the schedule

Weeks

Reading Assignment

Examination/Project

1

Aug 17 - 23

Chapter 1: Overview

Chapter 2: Cryptographic Tools

 

2

Aug 24 - 30

Chapter 3: User Authentication

Chapter 4: Access Control

 

3

Aug 31 - Sept 6

Chapter 5: Intrusion Detection

Chapter 6: Malicious Software

 

4

Sept 7 -  13

Chapter 8: Denial of Service

Chapter 9: Firewalls

 

5

Sept 14 -  20

Chapter 10: Trusted Computing

Chapter 11: Buffer Overflow

 

6

Sept 21 -  27

Chapter 12: Software Security

Chapter 13: Physical Security

 

7

Sept 28 -  Oct 4

Review of Chapters 1 -13

 

8

Oct 2 - 6

***************************************

Midterm

9

Oct 12 - 18

Chapter 14: Human Factors

Chapter 15: Security Auditing

 

10

Oct 19 - 25

Chapter 16: IT Management and Risk Assessment

Chapter 18: Legal and Ethical Aspects

 

11

Oct 16 – Nov 1

Chapter 19: Symmetric Key Encryption and Message Confidentiality

 

12

Nov 2 - 8

Chapter 20: Public Key Cryptography and Message Authentication

 

13

Nov 9 - 15

Chapter 21: Internet Security Protocols and Standards

Chapter 22: Internet Authentication Applications

 

14

Nov 16 - 22

Chapter 23: Linux Security

Chapter 24: Windows Security

 

15

Nov 23 – Dec 7

Review: Chapters 1- 24

Final Project/Research