Lecture Slides + Recordings
      
      
      
      
        
      
      
      
      
      
      
      
      
      
      
      
      
    
    
    
      
	
		
			| Topic | Recording (2020) | Slides | Reading/Other | 
	
	
		
			| Network Recapitulation | Network Recapitulation | Slides |  | 
		
			| Introduction | Introduction | Slides |  | 
		
			| Symmetric Cryptography | CryptographySymmetric crypto, the OTP, and notions of security
 Stream ciphers
 Some pitfalls
 Block ciphers
 AES
 Modes of operation
 Cryptanalysis
 | Slides | Anderson, ch. 5 Paar, ch. 1, 2, 4, 5
 | 
		
			| Asymmetric Cryptography | Key Exchange Asymmetric Encryption
 Hash Functions
 MAC + Digital Signature
 Final Remarks
 | Slides | Paar, ch. 6, 7, 8, 10, 11, 12 DH Key Exchange (YouTube) | 
		
			| Key management and entity authentication - Kerberos | IntroductionKDC and Kerberos
 | Slides | Oorschot, ch. 4Paar, ch. 13
 | 
		
			| Certificates and PKI | IntroductionCertificates
 PKI
 General Threats
 CA Threats
 | Slides | Oorschot, ch. 8 | 
		
			| Transport Layer Security | Introduction TLS 1.2
 TLS 1.3
 Further Details
 | Slides | Oorschot, ch. 8.5, 9.2 | 
		
			| Domain Name System (DNS) | Introduction Authenticity
 Confidentiality
 | Slides | Oorschot ch. 11.5 | 
		
			| Perimeter security and network segmentation | IntroductionSecurity principles
 Network segmentation
 Firewalls
 Firewall types
 Information flow control
 | Slides | Oorschot, ch. 10.1, 10.2 | 
		
			| Security monitoring and detection (IDS) | Security monitoring and detectionDetection approaches
 TLS inspection
 Indicators and capability levels
 False positives and negatives
 Miscellaneous (IPS, honeypots, ML & DLP)
 | Slides | Oorschot, ch. 11.1, 11.2, 11.3 | 
		
			| BGP security | IntroductionBGP router security
 Prefix hijacking
 RPKI and BGPsec
 | Slides | "Securing BGP - A Literature Survey" (pp. 199-208) "Securing BGP with BGPsec" | 
		
			| Email | Introduction Phishing
 Privacy
 SPAM
 Other issues
 | Slides |  | 
		
			| Wireless and IP security (lecture cancelled) | Introduction and threatsWLAN security evolution
 WLAN basics
 RSN overview and port-based access control
 RSN - more detailed
 Miscellaneous and final remarks
 | Slides | NIST SP 800-97, ch. 2, 3, 4, 5 Oorschot ch. 10.4 and 10.5 | 
		
			| Review / Exam preparation / Seminar information |  | Slides |  | 
	
 
 
 
     
   
  
      
        
          
        
      
  
  
  
    
    
    
    
    
      
        
          Published Aug. 24, 2021 
          
             -  Last modified Nov. 1, 2021