Week | Tuesday | Thursday |
---|---|---|
1 | 8/30 | 9/1 |
Thinking Security | Syllabus & Terminology | Threat |
2 | 9/6 | 9/8 |
Threat Models | Risks and Design Principles | Threat Modelling |
3 | 9/13 | 9/15 |
Hashing | One-way Hashes | Two-way Hashes |
4 | 9/20 | 9/22 |
Hashing Intensive | RSA overview | SHA overview |
5 | 9/27 | 9/29 |
Hashing Applications | OFF | Blockchain |
6 | 10/4 | 10/6 |
Distributed Systems | DDOS | TOR |
7 | 10/11 | 10/13 |
Midterm | Practice | Actual |
8 | 10/18 | 10/20 |
Individual Security | Snowden and Winner | Zoë Quinn |
9 | 10/25 | 10/27 |
Societal Security | Estonia 2007, VR Systems 2016, Colonial Pipeline 2021 | Heartbleed, Solarwinds |
10 | 11/1 | 11/3 |
🌈THEORY WEEK🌟 | ||
11 | 11/8 | 11/10 |
Student Topics | ||
12 | 11/15 | 11/17 |
Midterm | Practice | Actual |
13 | 11/22 | 11/24 |
Fall Break | OFF | OFF |
14 | 11/29 | 12/1 |
Student Topics | ||
15 | 12/6 | 12/8 |
Final | Presentations | Presentations |