COMPSCI642: Introduction to Information Security (001) FA19
COMPSCI642: Introduction to Information Security (001) FA19
Course Modules
Course topics, schedule, and lectures
Course topics, schedule, and lectures
Module Completed
Module In Progress
Module Locked
-
External UrlCourse schedule (tentative) Course schedule (tentative)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Introduction to Information Security
Introduction to Information Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 5): Introduction Slides (Sept 5): IntroductionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlSaltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975 Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Cryptography
Cryptography
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 10-17): Cryptography Slides (Sept 10-17): CryptographyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 10: Symmetric Encryption
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Cryptography Engineering (Ch: 1-4) (Required) Cryptography Engineering (Ch: 1-4)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 12: Hash function and MACs, Public-key encryption (part-1)
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Security Engineering (Chap: 5-6) (Required) Security Engineering (Chap: 5-6)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Cryptography Engineering (Ch: 11, 12) (Required) Cryptography Engineering (Ch: 11, 12)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlTwenty Years of Attacks on the RSA Cryptosystem Twenty Years of Attacks on the RSA CryptosystemScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
User Authentication
User Authentication
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept19-24) : User Authentication Slides (Sept19-24) : User AuthenticationScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Passwords
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url*Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’GormanScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlThe password thicket: technical and market failures in human authentication on the web The password thicket: technical and market failures in human authentication on the webScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Biometrics authentication and human aspects of security
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlBiometrics: A Grand Challenge Biometrics: A Grand ChallengeScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAn Introduction to Biometric Recognition An Introduction to Biometric RecognitionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Web Security
Web Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 26-Oct 1): Web security Slides (Sept 26-Oct 1): Web securityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlBrowser Security: Lessons from Google Chrome Browser Security: Lessons from Google ChromeScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAdvanced SQL Injection In SQL Server Applications Advanced SQL Injection In SQL Server ApplicationsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlRobust Defenses for Cross-Site Request Forgery, Barth et al. Robust Defenses for Cross-Site Request Forgery, Barth et al.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlClickjacking Vulnerability and Countermeasures Clickjacking Vulnerability and CountermeasuresScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Network Security
Network Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 3 ): TLS & Certificates Slides (Oct 3 ): TLS & CertificatesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlSlides (Oct 8-17): N/w security Slides (Oct 8-17): N/w securityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 3) TLS and Certificate
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlTransport Layer Security (TLS) Transport Layer Security (TLS)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 8) Security of DNS and BGP routing
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlPrimer on DNS Primer on DNSScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlDNS cache poisoning, by Steve Friedl DNS cache poisoning, by Steve FriedlScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlA Survey of BGP Security A Survey of BGP SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 10) TCP/IP/Link layer Security
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlA Look Back at 'Security Problems in the TCP/IP Protocol Suite A Look Back at 'Security Problems in the TCP/IP Protocol SuiteScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAddress Resolution Protocol Spoofing and Man-in-the-Middle Attacks Address Resolution Protocol Spoofing and Man-in-the-Middle AttacksScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 17) WiFi security, Firewall and IDS
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlWireshark tutorial (references) Wireshark tutorial (references)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlIntroducing Nmap Introducing NmapScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAn Intrusuion-Detection Model An Intrusuion-Detection ModelScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
OS Security
OS Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 22): OS Sec Slides (Oct 22): OS SecScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlTOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical StudyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlMultics Security Evaluation: Vulnerability Analysis Multics Security Evaluation: Vulnerability AnalysisScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Low-level Software Security
Low-level Software Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 24-31): Lowe-level Software Security Slides (Oct 24-31): Lowe-level Software SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlThe Hacker's Strategy, Dave Aitel The Hacker's Strategy, Dave AitelScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageBuffOverflowDemo_details BuffOverflowDemo_detailsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Security of Virtualization
Security of Virtualization
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Nov 5-7): Virtualization and Cloud Security Slides (Nov 5-7): Virtualization and Cloud SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlCompatibility is Not Transparency: VMM Detection Myths and Realities Compatibility is Not Transparency: VMM Detection Myths and RealitiesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlHey, You, Get Off of My Cloud Hey, You, Get Off of My CloudScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Hardware Security
Hardware Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Nov 21): Hardware Security Slides (Nov 21): Hardware SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlExploiting the DRAM Rowhammer bug to gain kernel privileges Exploiting the DRAM Rowhammer bug to gain kernel privilegesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlFLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel AttackScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete