Lectures and Workshops Spring 2010 - INF3510 Information Security
Week | Date | L# | Lecture Topic | Notes | Reading | Workshops |
---|---|---|---|---|---|---|
W04 | 25.01.2010 | L01 | Background and Basic Concepts | L01 | Book (Ch.1: p.1-19, Ch.2: p.37–81), X.800 (Definitions of concepts) | |
W05 | 01.02.2010 | L02 | Cryptography | L02 | Book (Ch.8: p.349-375) | WS01 |
W06 | 08.02.2010 | L03 | Key Management and PKI | L03 | Book (Ch.8: p.375-382). For interested: NIST-SP800-57, X.509 | WS02 |
W07 | 15.02.2010 | L04 | Authentication | L04 | Book (Ch.7: p.338-343). For interested: Introduction to Biometric Recognition | WS03 |
W08 | 22.02.2010 | L05 | Access Control and Security Models | L05 | Book (Ch.4: p.141-142, Ch.5: p.181-182). For interested: Bell-LaPadula, Clark-Wilson, Brewer-Nash, RBAC | WS04 |
W09 | 01.03.2010 | L06 | Communication Security | L06 | Book (Ch.8: p.382-391), X.800 (Layers for security services) | WS05 |
W10 | 08.03.2010 | L07 | Identity and Access Management | L07 | Book (Ch.6: p.275-282), For interested: FADS, NeAF | WS06 |
W11 | 15.03.2010 | L08 | Perimeter Security | L08 | Book (Ch.6: p.244-275, Ch.7: p.289-337) | WS07 |
W12 | 22.03.2010 | L09 | Physical Security and the Human Factor | L09 | Book (Ch.9 & Ch.11) | WS08 |
W13 | No lecture | |||||
W14 | No lecture | |||||
W15 | 12.04.2010 | L10 | Computer Security and Trusted Systems | L10 | WS09 | |
W16 | 19.04.2010 | L11 | Security Management and Secure Systems Development | L11 | Book (Ch.3 and Ch.5). For interested: 10 Deadly Sins of IS | WS10 |
W17 | 26.04.2010 | L12 | Risk Management and Business Continuity Planning | L12 | Book (Ch.4). For interested: NIST SP800-30, NIST SP800-34 | WS11 |
W18 | 03.05.2010 | L13 | Application Security and Trust Management | L13 | WS12 | |
W19 | 10.05.2010 | L14 | Privacy and Computer Forensics | L14 | WS13 | |
W20 | 18.05.2010 | L15 | Review. 10:15h - 12:00h Store Aud. | Review | WS14 | |
W21 | No lecture |
|||||
W22 | 04.06.2010 | Exam time 14:30h - 17:30h |
Back to INF3510 main site.