Lecture Slides + Recordings

Topic Recording (2020) Slides Reading/Other
Network Recapitulation Network Recapitulation Slides  
Introduction Introduction Slides  
Symmetric Cryptography

Cryptography
Symmetric crypto, the OTP, and notions of security
Stream ciphers
Some pitfalls
Block ciphers
AES
Modes of operation
Cryptanalysis

Slides Anderson, ch. 5
Paar, ch. 1, 2, 4, 5
Asymmetric Cryptography Key Exchange
Asymmetric Encryption
Hash Functions
MAC + Digital Signature
Final Remarks
Slides

Paar, ch. 6, 7, 8, 10, 11, 12

DH Key Exchange (YouTube)

Key management and entity authentication - Kerberos

Introduction
KDC and Kerberos

Slides

Oorschot, ch. 4
Paar, ch. 13

Certificates and PKI

Introduction
Certificates
PKI
General Threats
CA Threats

Slides Oorschot, ch. 8
Transport Layer Security Introduction
TLS 1.2
TLS 1.3
Further Details
Slides Oorschot, ch. 8.5, 9.2
Domain Name System (DNS) Introduction
Authenticity
Confidentiality
Slides Oorschot ch. 11.5
Perimeter security and network segmentation

Introduction
Security principles
Network segmentation
Firewalls
Firewall types
Information flow control

Slides Oorschot, ch. 10.1, 10.2
Security monitoring and detection (IDS)

Security monitoring and detection
Detection approaches
TLS inspection
Indicators and capability levels
False positives and negatives
Miscellaneous (IPS, honeypots, ML & DLP)

Slides Oorschot, ch. 11.1, 11.2, 11.3
BGP security

Introduction
BGP router security
Prefix hijacking
RPKI and BGPsec

Slides

"Securing BGP - A Literature Survey" (pp. 199-208)

"Securing BGP with BGPsec"

Email Introduction
Phishing
Privacy
SPAM
Other issues
Slides  
Wireless and IP security (lecture cancelled)

Introduction and threats
WLAN security evolution
WLAN basics
RSN overview and port-based access control
RSN - more detailed
Miscellaneous and final remarks

Slides

NIST SP 800-97, ch. 2, 3, 4, 5

Oorschot ch. 10.4 and 10.5

Review / Exam preparation / Seminar information   Slides  

 

 

 

Published Aug. 24, 2021 4:10 PM - Last modified Nov. 1, 2021 2:06 PM