Tentative Lecture Plan
Tentative lecture flow
will be as follows. Some changes may occur depending upon the pace of
the class. In the table below, texts in GREEN in
Topics column represent notes I add after the class - in particular with
regards to coverage.
Some helpful notes: Some previous experiences of the students and mine that may be
helpful to you are as follows:
-
Students who have taken this course have felt that
this is a very dense course - primary reason for it being dense our goal
to maintain the NSA IA standards.
-
In earlier offerings of this course, students who
lacked strong mathematical background had found the first half of the
course, which is focused on theoretical issues, quite challenging.
Students are strongly recommended to read the materials before it is
covered in the class. Most of the lecture materials will be similar to
earlier offerings of the course, with updates and corrections.
-
The second half of the course content is much softer
and less effort is needed to understand the concepts - but a lot of
reading is required. This helps students to concentrate more on projects
and labs/programming assignment.
-
The course is designed primarily with the overall
security track in mind. The coverage is also expected to provide a
foundational knowledge and broad understanding of security field, if
this is the only course the student plan to take.
|
Lecture/Date |
Topics |
Slides |
Week
1
(Aug 31, 2006) |
Introduction
to the course;
Chap 1:
Overview of Security
[Stopped at Slide #38]
|
(Lecture
1) |
Week
2
(Sept 7,
2006)
|
Mathematical
Review
Chap 2:
Access Control Matrix
[Stopped at Slide #15 of Lecture 2;
We will start Chap 2 in the next class]
|
(Lecture
2) |
Week 3
(Sept 14,
2006)
|
Chap3: Foundational results
Chap 4:
Security Policies
[Stopped at Slide #6 of Lecture 3]
|
(Lecture
3) |
Week 4
(Sept 21,
2006)
|
Chap 5:
Confidentiality Policies
[Stopped at Slide #11 of Lecture 4]
|
(Lecture
4) |
Week 5
(Sept 28,
2006)
|
Chap 6:
Integrity Policies
Chap 7:
Hybrid Policies
[Stopped at Slide #25 of Lecture 5]
|
(Lecture
5) |
Week
6
(Oct 5 ,
2006)
|
Chap
13:
Design Principles
Chap 9: Basic Cryptography and Network Security
[Stopped at Slide #12 of Lecture 6]
|
(Lecture
6) |
(Oct 12,
2006)
|
Midterm
|
|
Week
7
(Oct 19,
2006)
|
Chap 9: Basic Cryptography and Network Security
(continued)
[Stopped at Slide #80 of Lecture 6]
|
(no new
slides) |
Week
8 (Oct
26,
2006) |
Chap 10: Key Management
[Stopped at Slide #32 of Lecture 7]
|
(Lecture
7) |
Week
9
(Nov 2,
2006)
|
Chap 18: Evaluation
Risk Management, Legal & Ethical Issues, Physical
protection, & Miscellaneous (Reading Materials)
|
(Slides) [Guest
lecture by GSA] |
Week
10
(Nov 9,
2006)
|
[Continue
with Lecture 7]
Chap 11, 12, 14: Network Security, Authentication and
identity
|
(Lecture
8) |
Week
11
(Nov 16,
2006)
|
Quiz 1
(First Half - Coverage till Week 9)
[Stopped at Slide #33 of Lecture 8]
|
|
Week 12
(Nov 30, 2006)
|
Chap 17, 19, 20: Assurance, Malicious code, Vulnerability Analysis
[Stopped at Slide #37 of Lecture 9]
|
(Lecture
9) |
Week 13
(Dec 7, 2006)
|
Chap 21, 22 Auditing, Intrusion Detection, Watermarking
|
(Lecture
10) |
Week 14
(Dec 14, 2006)
|
Final (Quiz 2)
|
|