Introduction and Course Overview

Internet Architecture and IP Addresses

ARP Protocol and ARP Cache Poisoning

IP and ICMP Protocol and Attacks

UDP Protocol and Attacks

TCP Protocol and Attacks

  • Required Reading: Chapter 13. Computer Security: A Hands-on Approach by W. Du

Firewall

  • Required Reading: Chapter 14. Computer Security: A Hands-on Approach by W. Du

DNS and Pharming Attacks

Virtual Private Network (VPN)

  • Required Reading: Chapter 16. Computer Security: A Hands-on Approach by W. Du

Secret-Key Encryption

One-way Hash Function

  • Required Reading: My book chapters on this topic will be ready by the time we get here.

Public-Key Encryption and Digital Signature

  • Required Reading: My book chapters on this topic will be ready by the time we get here.

Public-Key Infrastructure

  • Required Reading: Chapter 18. Computer Security: A Hands-on Approach by W. Du
  • The DigiNotar Story

Transport Layer Security (TLS)

  • Required Reading: Chapter 19. Computer Security: A Hands-on Approach by W. Du
  • The Heartbleed Attack
    • Required Reading: Chapter 17. Computer Security: A Hands-on Approach by W. Du

Case Study: Mistakes in Using Cryptography

Security of Routing Protocols and BGP