Course overview
Below you can find my lecture notes, and see the general structure of the course.
Examination
This course uses continuous examination. See separate page for details.
Basic block
- Introduction and overview [chapters 1-2]
- Identification and authentication [chapter 3]
- Cryptology overview [chapter 11]
- Access control [chapter 4]
- Security models [chapters 8-9] part 1, part 2
Extension block
- Reference monitors [chapter 5]
- Unix security [chapter 6]
- Windows security [chapter 7]
- Distributed systems security [chapter 12]
- Network security [chapter 13]
- Software security [chapter 14]
- "New" Access Control paradigms [chapter 15]
- Small project with written and oral presentation, on a more narrow subject of your choice.