Network Security Essentials

Study plan


[Home] [Plan] [Exercises] [Projects]
 
Date
Topic
Topic Responsible
Comments

38
Introduction to network security. Introduction to exercises and R&D projects
Rune Jacobsen
Text book chapter 1.
Slides to chapter 1
39
Symmetric encryption and message confidentiality
Pavel Lisouski
Text book chapter 2.
Slides to Chap. 2 from Pavel
(Alternative set)
40
Public-key Cryptography and Message Confidentiality
Tommy Hansen
Text book chapter 3.
Slides to chapter 3
Hand-in of exercise 1
41
Key distribution and user authentication
Ryan Lee
Text book chapter 4.
Slides to chapter 4
42-44
No meeting.



45
Transport-Level Security
Ruben Sternke
Text book chapter 5.
Slides to chapter 5
46
Peer-to-peer work session with exercises 1, 2, and 3.
All
We will sit together and go through of the difficult parts of exercise 1,2 and 3 (primariely).
47
Wireless Network Security
Miran Hasanagic
Text book chapter 6.
Slides to chapter 6
Hand-in of exercise 2
48
Electronic Mail Security
Tashi Sherpa
Text book chapter 7.
Slides to chapter 7
Hand-in of exercise 3

49
IP security
Rune Jacobsen
Text book chapter 8.
Slides to chapter 8
Hand-in of exercise 4
50
Intruders and Intrusion detection
Malicious software
Firewall
Jacob Lauritsen
Ismael Garcia
Maya Ale
Text book chapter 9, 10, and 11.
Slides to chapter 9
Slides to chapter 10
Slides to chapter 11
Hand-in of exercise 5
51
Project presentations

Hand-in of Exercise 6
52
Hand-in of R&D projects
(by email)

 

[Home] [Plan] [Exercises] [Projects]

Copyright 2012, Aarhus University School of Engineering