May 2004 | ||||||
---|---|---|---|---|---|---|
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 | ||||||
2 | 3 | 4 Lecture 1 Introduction to Security, Privacy and Usability Assignment #1 |
5 | 6 Lecture 2 Security Policies and Privacy Policies Assignment #1 collected Assignment #2 released |
7 | 8 |
9 | 10 | 11 Lecture 3 Introduction to HCI Usability Assignment #2 collected and distributed to classmates Assignment #3 released |
12 | 13 Lecture 4 Today's Information Security Landscape Assignment #2 returned |
14 | 15 |
16 | 17 | 18 Lecture 5 Physical Security and Information Leakage Assignment #3 collected Assignment #4 released: Assignment #5 released: |
19 | 20 Lecture 6 Personnel Security and Social Engineering |
21 | 22 |
23 | 24 | 25 Lecture 7 Hash Functions, Fingerprints, and Binary Data. Assignment #4 collected |
26 | 27 Lecture 8 Encryption Algorithms |
28 | 29 |
30 | 31 |   |   |   |   |   |
June 2004 | ||||||
---|---|---|---|---|---|---|
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 Lecture 9 User Authentication 1: Passwords and Password Management Assignment #5 collected Assignment #6 released: |
2 | 3 Lecture 10 User Authentication 2: PKI |
4 | 5 | ||
6 | 7 | 8 Lecture 11 Biometrics Assignment #6 collected Assignment #7 released! |
9 | 10 Lecture 12 Special lecture on hash functions |
11 | 12 |
13 | 14 | 15 Lecture 13 Worms, Viruses and Automated Spoofing Assignment #7 collected |
16 | 17 Lecture 14 Quiz #1 |
18 | 19 |
20 | 21 | 22 Lecture 15 Secure Messaging |
23 | 24 Lecture 16 Design for Secure Interaction |
25 | 26 |
27 | 28 | 29 Lecture 17 RFID Assignment #8 (Optional) |
30 |   |   |   |
July 2004 | ||||||
---|---|---|---|---|---|---|
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 Lecture 18 Logging, Integrity Management, and Computer Crime (Marathon class) |
2 | 3 | ||||
4 | 5 | 6 Lecture 19 No Class |
7 | 8 Lecture 20 No class |
9 | 10 |
11 | 12 | 13 Lecture 21 Highlights from the DIMACS conference; Incident Response; Honeynet Project |
14 | 15 Lecture 22 Trusted Computing |
16 | 17 |
18 | 19 | 20 Lecture 23 Privacy Protecting Technologies |
21 | 22 Lecture 24 Watermarking and Steganography |
23 | 24 |
25 | 26 | 27 Lecture 25 NO LECTURE DNC |
28 | 29 Lecture 26 Quiz #2 |
30 | 31 |
August 2004 | ||||||
---|---|---|---|---|---|---|
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 | 2 | 3 Lecture 27 Secure Coding, Testing, and wrap-up |
4 | 5 Lecture 28 Presentation of Final Projects |
6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 *TODAY* |
31 |   |   |   |   |