I-433: Systems & Protocol Security & Information Assurance
(Spring 2017)


[ Home | Policies | Schedule | Project | Paper | Resources ]

Class Schedule

Date Topic Readings
Jan 9 No class
Jan 11 Introduction and Administrivia Course policies, Plagiarism
Jan 13 No lab
Jan 16 Martin Luther King Jr. Day

No class, consider attending these events:
Martin Luther King, Jr. Celebration 2017, Jan 12–16th

Jan 18 What is security? SB Ch. 1.1–1.3
Jan 20 Lab 1: Linux Installation Lab
Jan 23 Concepts in security design SB Ch. 1.1–1.3
Jan 25 Introducing the Access Control Matrix SB Ch. 4.1–4.4
Jan 27 Lab 2: Access Control in UNIX
Jan 30 Access Control in UNIX SB Ch. 4.1–4.4
Feb 1 Advanced Concepts in Access Control SB Ch. 4.1–4.4
Feb 3 No Lab: Office Hours in Lab
Feb 6 Advanced Concepts in Access Control SB Ch. 4.1–4.4
Feb 8 Databases and SQL — Intro SB Ch. 5.1–5.5
Feb 10 Lab 3: Advanced Access Control in UNIX
Feb 13
Databases and SQL — SQL Demo SB Ch. 5.1–5.5
Feb 15 Databases and SQL — SQL Injection SB Ch. 5.1–5.5
Feb 17 No Lab: Office Hours in Lab
Feb 19 Paper Proposal Due
Feb 20 Databases and SQL — SQL Injection Defenses SB Ch. 5.1–5.5
Feb 22 Databases and SQL — Access Control SB Ch. 5.1–5.5
Feb 24 Lab 4: SQL Injection Lab
Feb 27 Symmetric Cryptography — Intro SB Ch. 2.1–2.2
Mar 1 Symmetric Cryptography — One Time Pads SB Ch. 20.5
Mar 3 No Lab: Office Hours in Lab
Mar 6 Symmetric Cryptography — One Time Pads SB Ch. 2.1–2.2, 20.5, Supplemental Reading
Mar 8 Symmetric Cryptography — Block Ciphers SB Ch. 2.1–2.2, 20.5, Supplemental Reading
Mar 10 Lab 5: SQL Injection Defense Lab
Mar 13 Spring Break, no class
Mar 15 Spring Break, no class
Mar 20 Symmetric Cryptography — MACs SB Ch. 2.1–2.2, 20.5, Supplemental Reading
Mar 22 Asymmetric Cryptography: Encryption SB Ch. 2.3–2.5
Mar 24 No Lab: Office Hours in Lab
Mar 27 Asymmetric Cryptography: Key Exchange Problem SB Ch. 2.3–2.5
Mar 29 Asymmetric Cryptography: Key Sizes SB Ch. 2.3–2.5
Mar 31 No lab this week. Work on research paper
Apr 3 Asymmetric Cryptography: Signatures, Hash Functions SB Ch. 2.3–2.5
Apr 5 Asymmetric Cryptography: Signatures, Hash Functions SB Ch. 2.3–2.5
Apr 7 Lab 6: Asymmetric Cryptography
Apr 10 Asymmetric Cryptography: Certificates and PKI SB Ch. 2.3–2.5
Apr 12 Security Development Lifecycle: Best Practices SDL Ch. 7
Apr 14 No Lab
Apr 17 Security Development Lifecycle: Risk Assessment SDL Ch. 8
Apr 19 Security Development Lifecycle: Risk Analysis SDL Ch. 9
Apr 21 Final Term Paper Presentations During Afternoon Lab ("3-Minute Madness")
Sun, Apr 23 Final Term Paper Due
Apr 24 Security Development Lifecycle leftovers
Apr 26 Final Exam Review Session
Apr 28 No lab assignments: treat as AI office hours
May 5 Closed-book, Comprehensive Final Exam
Covers Entire Syllabus (all readings and labs)
10:15am–12:15pm, Ballantine Hall 232