CSC432 - Information Security
Class overview
The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer and information security. Focus will be on the software, operating system, and data security techniques with detailed analysis of real-world examples. Topics include cryptography, authentication, software and operating system security (e.g., buffer overflow), Internet vulnerability (DoS attacks, viruses/worms, etc.), intrusion detection systems, firewalls, VPN, Web and wireless security. This course can help satisfy the project course requirement for undergraduates.
Resources
Video Lectures
Lecture 1 : https://drive.google.com/file/d/1oHbkYWIYT5cHJtVvyBF4QTg8jcm5edxL/view?usp=sharing
Lecture 2 : https://drive.google.com/file/d/1f9zyeJsfXkj5y9GpvNq56w2Pnv6b6WLr/view?usp=sharing
Lecture 3-A : https://drive.google.com/file/d/1E7QV1Mp4y8iL9p070wBZce5EeSINu74o/view?usp=sharing
Lecture 3-B : https://drive.google.com/file/d/1_O1x71rkDlrVLC8eZND-C3dAcyaGT_gp/view?usp=sharing
Lecture 4-A : https://drive.google.com/file/d/1a021XKmiLe19VJYzkSCyPBHeTXQdvCSz/view?usp=sharing
Lecture 4-B : https://drive.google.com/file/d/10eWAqOhw64HnEz9yZ_omD0IR6JpY64zm/view?usp=sharing
Lecture 5-A : https://drive.google.com/file/d/1xirVP9xOueqjDvMHWRvluGdpx9er-5qi/view?usp=sharing
Lecture 5-B : https://drive.google.com/file/d/1ddTZHlBy-rFCMEjzoEnkKMveLaiq3EYQ/view?usp=sharing
Lecture 6 : https://drive.google.com/file/d/1u63JDO3Bi_9-Yh4c2fS1tPXI7G635K0l/view?usp=sharing
Lecture 7-A : https://drive.google.com/file/d/1TYELea5Mv_sChaSgU6w_nppXSU4MCvJv/view?usp=sharing
Lecture 7-B : https://drive.google.com/file/d/1tz84QDTiQ1sT6igeR50jx3KHNfXNC1vH/view?usp=sharing
Lecture 8-A : https://drive.google.com/file/d/13C7cOvw6mADqKMs_VRb1JRjwMMBRCFJp/view?usp=sharing
PDF Slides
Lecture 1 : https://drive.google.com/file/d/1WIEk83S0Kr-Djfe_jviqz2aUxjDeMb7I/view?usp=sharing
Lecture 2 : https://drive.google.com/file/d/1GM0QvriN3ZJqByMwyoSjhkgqYG82OcjB/view?usp=sharing
Lecture 3 : https://drive.google.com/file/d/1Rb15tYTrS_NSC7HC44B7oKNs6mPs6cVo/view?usp=sharing
Lecture 4 : https://drive.google.com/file/d/1o54dmfXDINTO5ZvwXZLE0uHVP-KwFNvY/view?usp=sharing
Lecture 5 : https://drive.google.com/file/d/1cQRayQ4n85euTRPhOvxkhdW21lDMiZhF/view?usp=sharing
Lecture 6 : https://drive.google.com/file/d/1Hk_QT0kkJqjsE8IAgFKcaVYczjcNggpY/view?usp=sharing
Lecture 7 : https://drive.google.com/file/d/1DxDgYg-8RMl9oY8iKguzvfc6BTnNh5yv/view?usp=sharing