Introduction and Course Overview

Internet Architecture and IP Addresses

ARP Protocol and ARP Cache Poisoning

IP and ICMP Protocol and Attacks

UDP Protocol and Attacks

TCP Protocol and Attacks

  • Required Reading: Chapter 13. Computer Security: A Hands-on Approach by W. Du

Firewall

  • Required Reading: Chapter 14. Computer Security: A Hands-on Approach by W. Du

DNS and Pharming Attacks

Virtual Private Network (VPN)

  • Required Reading: Chapter 16. Computer Security: A Hands-on Approach by W. Du

Cryptography Basics and Applications(Lecture Notes)

Public-Key Infrastructure

  • Required Reading: Chapter 18. Computer Security: A Hands-on Approach by W. Du
  • The DigiNotar Story

Transport Layer Security (TLS)

  • Required Reading: Chapter 19. Computer Security: A Hands-on Approach by W. Du
  • The Heartbleed Attack
    • Required Reading: Chapter 17. Computer Security: A Hands-on Approach by W. Du

Case Study: Mistakes in Using Cryptography

Security of Routing Protocols and BGP