Documents

Stern Warning
Any notes found here are intended to supplement your own lecture notes.
They are not a substitute for attending class.

Lec No. Topic & Description PDF link PPTX link
Lec 01 Introduction PDF PowerPoint
  (Course Info, Security Objectives, Avenues of Attack)   
Lec 02 Standards, Principles, and Strategies PDF PowerPoint
  (Standards, Principles, and Strategies)   
Lec 03 Assembly and Stack Basics PDF PowerPoint
  (Memory Allocation, Assembly Language Review, and Stack Examples)   
Lec 04 Stack Overflow Attacks PDF PowerPoint
  (Example Code, Exploit Code, Overflow Input)   
Lec 05 Stack Overflow Shellcode & Demo PDF PowerPoint
  (Detailed Shellcode Explanation and Stack Overflow Demo)   
Lec 06 Overflow Defenses and Variations PDF PowerPoint
  (ASLR, Stack Canaries, Stack Execution, return-to-libc, ROP)   
Lec 07 Intro to Malware PDF PowerPoint
  (Threat Actors & Examples, Attribution, How Malware Spreads)   
Lec 08 Malware Categories and Lifecycle PDF PowerPoint
  (What Malware Does, Systems Malware Targets, Malware Lifecycles)   
Lec 09 Malware Analysis PDF PowerPoint
  (Hashing, Basic/Advanced, Static/Dynamic, Packing, Sandboxes, Exam Info)   
Lec 10 Intro to Cryptography PDF PowerPoint
  (Intro to Crypto, Block Ciphers, DES, 3DES, AES, Parallelization)   
Lec 11 Intro to Cryptography (continued) PDF PowerPoint
  (Block Cypher Modes, Assymetric Encryption, Diffie-Hellman, RSA)   
Lec 12 Hashing and Public Key Infrastructure PDF PowerPoint
  (Man in the Middle, MAC, Hashing, PKI, Certificates, Digital Signatures)   
Lec 13 Cryptanalysis PDF PowerPoint
  (Cryptanalytic Attacks, Pseudorandom Numbers)  Marron's slides
Lec 14 Ethics and Computer Security PDF PowerPoint
  (Case Studies: Let's Encrypt, Hutchins, Apple Encryption, etc.)   
Lec 15 Password Authentication and Cracking PDF PowerPoint
  (Password Hashes, Rainbow Tables and other Attacks, Salting)   
Lec 16 Linux and Windows Authentication PDF PowerPoint
  (Linux Authentication, LM, NTLM, Authentication Protocols)   
Lec 17 Kerberos and Exam Review PDF PowerPoint
  (Detailed Kerberos Explanation)   
Lec 18 OS Security Features PDF PowerPoint
  (Hardening Methods in Windows and Linux)   
Lec 19 Offensive Security PDF PowerPoint
  (Offensive Security, Demonstration)   
Lec 20 Intro to Networks PDF PowerPoint
  (TCP/IP model and Layers (Link, Internet, Transport, Application))   
Lec 21 Network Attacks PDF PowerPoint
  (Network Attacks on Different Layers, Network Security)   
Lec 22 Web Hacking and Security PDF PowerPoint
  (Background Info, Cross-Site Scripting, SQL Injection)   
Lec 23 Wireless Hacking and Security PDF PowerPoint
  (802.11 Standard, Wireless Hacking Techniques)