Documents
Stern Warning
Any notes found here are intended to supplement your own lecture notes.
They are not a substitute for attending class.
Lec No. | Topic & Description | PDF link | PPTX link |
---|---|---|---|
Lec 01 | Introduction | PowerPoint | |
(Course Info, Security Objectives, Avenues of Attack) | |||
Lec 02 | Standards, Principles, and Strategies | PowerPoint | |
(Standards, Principles, and Strategies) | |||
Lec 03 | Assembly and Stack Basics | PowerPoint | |
(Memory Allocation, Assembly Language Review, and Stack Examples) | |||
Lec 04 | Stack Overflow Attacks | PowerPoint | |
(Example Code, Exploit Code, Overflow Input) | |||
Lec 05 | Stack Overflow Shellcode & Demo | PowerPoint | |
(Detailed Shellcode Explanation and Stack Overflow Demo) | |||
Lec 06 | Overflow Defenses and Variations | PowerPoint | |
(ASLR, Stack Canaries, Stack Execution, return-to-libc, ROP) | |||
Lec 07 | Intro to Malware | PowerPoint | |
(Threat Actors & Examples, Attribution, How Malware Spreads) | |||
Lec 08 | Malware Categories and Lifecycle | PowerPoint | |
(What Malware Does, Systems Malware Targets, Malware Lifecycles) | |||
Lec 09 | Malware Analysis | PowerPoint | |
(Hashing, Basic/Advanced, Static/Dynamic, Packing, Sandboxes, Exam Info) | |||
Lec 10 | Intro to Cryptography | PowerPoint | |
(Intro to Crypto, Block Ciphers, DES, 3DES, AES, Parallelization) | |||
Lec 11 | Intro to Cryptography (continued) | PowerPoint | |
(Block Cypher Modes, Assymetric Encryption, Diffie-Hellman, RSA) | |||
Lec 12 | Hashing and Public Key Infrastructure | PowerPoint | |
(Man in the Middle, MAC, Hashing, PKI, Certificates, Digital Signatures) | |||
Lec 13 | Cryptanalysis | PowerPoint | |
(Cryptanalytic Attacks, Pseudorandom Numbers) | Marron's slides | ||
Lec 14 | Ethics and Computer Security | PowerPoint | |
(Case Studies: Let's Encrypt, Hutchins, Apple Encryption, etc.) | |||
Lec 15 | Password Authentication and Cracking | PowerPoint | |
(Password Hashes, Rainbow Tables and other Attacks, Salting) | |||
Lec 16 | Linux and Windows Authentication | PowerPoint | |
(Linux Authentication, LM, NTLM, Authentication Protocols) | |||
Lec 17 | Kerberos and Exam Review | PowerPoint | |
(Detailed Kerberos Explanation) | |||
Lec 18 | OS Security Features | PowerPoint | |
(Hardening Methods in Windows and Linux) | |||
Lec 19 | Offensive Security | PowerPoint | |
(Offensive Security, Demonstration) | |||
Lec 20 | Intro to Networks | PowerPoint | |
(TCP/IP model and Layers (Link, Internet, Transport, Application)) | |||
Lec 21 | Network Attacks | PowerPoint | |
(Network Attacks on Different Layers, Network Security) | |||
Lec 22 | Web Hacking and Security | PowerPoint | |
(Background Info, Cross-Site Scripting, SQL Injection) | |||
Lec 23 | Wireless Hacking and Security | PowerPoint | |
(802.11 Standard, Wireless Hacking Techniques) |