Course Modules

Course topics, schedule, and lectures

Course topics, schedule, and lectures
Module Completed Module In Progress Module Locked
Course topics, schedule, and lectures 297105  
  • External Url
    Course schedule (tentative) Course schedule (tentative)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Introduction to Information Security

Introduction to Information Security
Module Completed Module In Progress Module Locked
Introduction to Information Security 275492  
  • External Url
    Slides (Sept 5): Introduction Slides (Sept 5): Introduction
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    Gray hat hacking : The Ethical Hacker's Handbook Gray hat hacking : The Ethical Hacker's Handbook
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975 Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Cryptography

Cryptography
Module Completed Module In Progress Module Locked
Cryptography 285985  
  • External Url
    Slides (Sept 10-17): Cryptography Slides (Sept 10-17): Cryptography
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    Sept 10: Symmetric Encryption

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    (Required) Cryptography Engineering (Ch: 1-4) (Required) Cryptography Engineering (Ch: 1-4)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    Sept 12: Hash function and MACs, Public-key encryption (part-1)

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    (Required) Security Engineering (Chap: 5-6) (Required) Security Engineering (Chap: 5-6)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    HW1 HW1
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    Number Theory Primer Number Theory Primer
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    (Required) Cryptography Engineering (Ch: 11, 12) (Required) Cryptography Engineering (Ch: 11, 12)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Twenty Years of Attacks on the RSA Cryptosystem Twenty Years of Attacks on the RSA Cryptosystem
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

User Authentication

User Authentication
Module Completed Module In Progress Module Locked
User Authentication 285986  
  • External Url
    Slides (Sept19-24) : User Authentication Slides (Sept19-24) : User Authentication
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    Passwords

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    The password thicket: technical and market failures in human authentication on the web The password thicket: technical and market failures in human authentication on the web
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    Biometrics authentication and human aspects of security

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Biometrics: A Grand Challenge Biometrics: A Grand Challenge
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    An Introduction to Biometric Recognition An Introduction to Biometric Recognition
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Web Security

Web Security
Module Completed Module In Progress Module Locked
Web Security 285988  
  • External Url
    Slides (Sept 26-Oct 1): Web security Slides (Sept 26-Oct 1): Web security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Browser Security: Lessons from Google Chrome Browser Security: Lessons from Google Chrome
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Advanced SQL Injection In SQL Server Applications Advanced SQL Injection In SQL Server Applications
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    XSS_Explained.pdf XSS_Explained.pdf
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Robust Defenses for Cross-Site Request Forgery, Barth et al. Robust Defenses for Cross-Site Request Forgery, Barth et al.
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Clickjacking Vulnerability and Countermeasures Clickjacking Vulnerability and Countermeasures
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Network Security

Network Security
Module Completed Module In Progress Module Locked
Network Security 285987  
  • External Url
    Slides (Oct 3 ): TLS & Certificates Slides (Oct 3 ): TLS & Certificates
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Slides (Oct 8-17): N/w security Slides (Oct 8-17): N/w security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    (Oct 3) TLS and Certificate

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Transport Layer Security (TLS) Transport Layer Security (TLS)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    (Oct 8) Security of DNS and BGP routing

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Primer on DNS Primer on DNS
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    DNS cache poisoning, by Steve Friedl DNS cache poisoning, by Steve Friedl
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    A Survey of BGP Security A Survey of BGP Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    (Oct 10) TCP/IP/Link layer Security

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    A Look Back at 'Security Problems in the TCP/IP Protocol Suite A Look Back at 'Security Problems in the TCP/IP Protocol Suite
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context Module Sub Header

    (Oct 17) WiFi security, Firewall and IDS

    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Wireshark tutorial (references) Wireshark tutorial (references)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Introducing Nmap Introducing Nmap
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    An Intrusuion-Detection Model An Intrusuion-Detection Model
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

OS Security

OS Security
Module Completed Module In Progress Module Locked
OS Security 285990  
  • External Url
    Slides (Oct 22): OS Sec Slides (Oct 22): OS Sec
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Multics Security Evaluation: Vulnerability Analysis Multics Security Evaluation: Vulnerability Analysis
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Low-level Software Security

Low-level Software Security
Module Completed Module In Progress Module Locked
Low-level Software Security 306086  
  • External Url
    Slides (Oct 24-31): Lowe-level Software Security Slides (Oct 24-31): Lowe-level Software Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    The Hacker's Strategy, Dave Aitel The Hacker's Strategy, Dave Aitel
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    BuffOverflowDemo_details BuffOverflowDemo_details
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    Format String Vulnearabilities Format String Vulnearabilities
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Security of Virtualization

Security of Virtualization
Module Completed Module In Progress Module Locked
Security of Virtualization 306087  
  • External Url
    Slides (Nov 5-7): Virtualization and Cloud Security Slides (Nov 5-7): Virtualization and Cloud Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Compatibility is Not Transparency: VMM Detection Myths and Realities Compatibility is Not Transparency: VMM Detection Myths and Realities
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Hey, You, Get Off of My Cloud Hey, You, Get Off of My Cloud
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Hardware Security

Hardware Security
Module Completed Module In Progress Module Locked
Hardware Security 285991  
  • External Url
    Slides (Nov 21): Hardware Security Slides (Nov 21): Hardware Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    Slides (Nov 26): SideChannels Slides (Nov 26): SideChannels
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    Exploiting the DRAM Rowhammer bug to gain kernel privileges Exploiting the DRAM Rowhammer bug to gain kernel privileges
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • External Url
    FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Miscellaneous

Miscellaneous
Module Completed Module In Progress Module Locked
Miscellaneous 288139  
 
minimum score must view must submit must contribute