Topic | Video | Slides | Other |
---|---|---|---|
Introduction | (no recording) | Slides | |
Symmetric Cryptography Nils Nordbotten |
Slides |
Anderson, ch. 5 Paar, ch. 1, 2, 4, 5 |
|
Asymmetric Cryptography Nils Gruschka |
Paar, ch. 6, 7, 8, 10, 11, 12 |
||
Key Management |
Slides |
Oorschot, ch. 4, 8 Paar, ch. 13 |
|
Transport Layer Security Nils Gruschka |
|
Oorschot, ch. 8.5, 9.2 |
|
Network Recapitulation | Slides | ||
Perimeter Security and Network Segmentation Nils Nordbotten |
Slides | Oorschot, ch. 10.1, 10.2 | |
Security Monitoring and Detection Nils Nordbotten |
Slides | Oorschot, ch. 11.1, 11.2, 11.3 | |
Wireless Network (WLAN) Security Nils Nordbotten |
Slides | SP 800-97, ch. 2, 3, 4, 5 | |
Border Gateway Protocol (BGP) Security Nils Nordbotten |
Slides |
"Securing BGP – A Literature Survey," pp. 199-208 (also available on Canvas) |
|
IPsec and MACsec Nils Nordbotten |
Slides | Oorschot ch. 10.4 and 10.5 | |
Domain Name System (DNS) Nils Gruschka |
Slides | Oorschot ch. 11.5 | |
Email Security Nils Gruschka |
Slides | ||
Summary + Exam Preparation | (no recording) |