Date
|
Lecture No.
|
Slides |
1/19/10 |
1 |
Course Introduction
Course Introduction
(pdf)
OS Security Notes
(pdf)
|
1/21/10 |
2 |
OS Techiques for Secure Programming
(pdf)
|
1/26/10 |
3 |
Work with ACLs on Vista in the Lab. Meet in 0222 SC.
Two sessions. One at normal class time. Another starting
at 2pm.
See assignments tab for exercise.
|
1/28/10 |
4 |
Finish up impersonation and setuid. Do some experiments with a
simple setuid program.
Some more about
windows access token exploits
(pdf).
|
2/2/10 |
5 |
SE Linux lecture
(pdf)
|
2/4/10 |
6 |
Open lab time for least privilege programming assignment.
Two sessions: One at normal class time and another starting at 2pm.
|
2/9/10 |
7 |
SE Linux class exercise.
Magic8 code
Again two sessions. One at normal class time and another starting at 2pm.
The magic8 policy that worked on my machine.
|
2/11/10 |
8 |
Networking and security review
(pdf)
|
2/16/10 |
9 |
Networking in the lab. Two sessions: one at normal class time and
another starting at 2pm.
|
2/18/10 |
10 |
Firewall technology
(pdf)
|
2/23/10 |
11 |
Firewalls in the Lab.
Again two sessions. One at regular time and one at
2pm.
|
2/25/10 |
12 |
IPv6 slides from Darrin Miller and Sean Convery. They also have an article.
Content-centered networking
(pdf)
|
3/2/10 |
13 |
Worms and memory malware techniques
(pdf)
|
3/4/10 |
|
Class canceled. Work on your firewall lab due 3/5 |
3/9/10 |
14 |
Metasploit in the lab. Two sessions.
|
3/11/10 |
15 |
Tunnels: VLAN and IPSec
(pdf)
|
3/16/10 |
16 |
IPSec in the lab.
Two sessions at 12:30 and 2pm. |
3/18/10 |
17 |
Intrusion detection
(pdf)
|
3/30/10 |
18 |
Guest Lecture: Ken Rowe from University of Illnois.
Enterprise Risk Management
ppt version
|
4/1/10 |
19 |
Intrusion detection in the lab. Two sessions as always. |
4/6/10 |
20 |
Security architectures
(pdf)
|
4/8/10 |
21 |
Guest Lecturer: Vlad Grigorescu on
hunting for and understanding malware
|
4/13/10 |
22 |
Guest lecturer: Gary Long from Cerner Corp. on data center security.
|
4/15/10 |
23 |
Lecture on web and database security
(pdf) |
4/20/10 |
24 |
Guest lecturer: Carrie Price from Sandia National Labs on reverse engineering
malware.
|
4/22/10 |
25 |
Breaking web sites in the lab |
4/27/10 |
26 |
Final project presentations: First Responder Group 2 and Distributed Office Group |
4/29/10 |
27 |
Final project presentations: First Responder Group 1 and Service Provider Group |
5/4/10 |
28 |
Final project presentations: Both University Groups |