The material is subdivided in small videos.
Please, watch the videos and go through the reading material in your own time.
Also remember to work on the accompanying exercises sheet
|AAA||video (6min) pdf ppt||N/A|
|Passwords||video (18min) pdf ppt||N/A|
|The password recovery problem||video (17min) pdf ppt||N/A|
|Man in the middle & password hammering||video (12min) pdf ppt||N/A|
|Better than password?||video (5min) pdf ppt||Bonneau et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE S&P 2012|
|Bonus video: Starbug’s Touch ID Attack||video (3min)||N/A|
|Introdcution to Networks P1||video 36min pdf Handouts||Book Chapter 5– Section 1.1, 1.2, 2.1, 2.3, 4.1, 4.2, 5.1, 5.2|
|Introdcution to Networks P2||video (25min) pdf Handouts||Book Chapter 5– Section 4.3, chapter 6- section 3.2 (intitial part), 3.3)|
|Introdcution to Firewalls||video (23min) pdf Handouts||Book chapter 6- section 2 (entire)|
|Introdcution to Intrusion Detection Systems||video (31min) pdf Handouts||Book chapter 6- section 4, 4.1, 4.2, 4.3|
|Introdcution to SSL/TLS||video (24min) pdf Handouts||Book chapter 7- section 1.2, SANS article|
Announcement we forgot to make: In order to help everyone to take a breath, we have removed one of the security lab, and rescheduled the OS labs to give you a bit more time to do the labs. There is more detail in the OS labs organization in Week 5 videos.