| Topic | Video | Slides | Other |
|---|---|---|---|
| Introduction | (no recording) | Slides | |
|
Symmetric Cryptography Nils Nordbotten |
Slides |
Anderson, ch. 5 Paar, ch. 1, 2, 4, 5 |
|
|
Asymmetric Cryptography Nils Gruschka |
Paar, ch. 6, 7, 8, 10, 11, 12 |
||
|
Key Management |
Slides |
Oorschot, ch. 4, 8 Paar, ch. 13 |
|
|
Transport Layer Security Nils Gruschka |
|
Oorschot, ch. 8.5, 9.2 |
|
| Network Recapitulation | Slides | ||
|
Perimeter Security and Network Segmentation Nils Nordbotten |
Slides | Oorschot, ch. 10.1, 10.2 | |
|
Security Monitoring and Detection Nils Nordbotten |
Slides | Oorschot, ch. 11.1, 11.2, 11.3 | |
|
Wireless Network (WLAN) Security Nils Nordbotten |
Slides | SP 800-97, ch. 2, 3, 4, 5 | |
|
Border Gateway Protocol (BGP) Security Nils Nordbotten |
Slides |
"Securing BGP – A Literature Survey," pp. 199-208 (also available on Canvas) |
|
|
IPsec and MACsec Nils Nordbotten |
Slides | Oorschot ch. 10.4 and 10.5 | |
|
Domain Name System (DNS) Nils Gruschka |
Slides | Oorschot ch. 11.5 | |
|
Email Security Nils Gruschka |
Slides | ||
| Summary + Exam Preparation | (no recording) |