1 |
Welcome & Introduction |
2 |
Policy and Aspects |
3 |
Beyond the Attacks |
4 |
Goals and Requirements |
5 |
Assurance |
6 |
Architectural Approaches to Security |
7 |
Equifax Fiasco |
8.1 |
Cryptography - Intro and Failures |
8.2 |
Cryptography - One Time Pads |
8.3 |
Cryptography - Block Ciphers |
8.4 |
Cryptography - Stream Ciphers |
8.5 |
Cryptography - Nonce and IV |
8.6 |
Cryptography - Key Exchange and Public Keys |
8.7 |
Cryptography - Authentication |
8.8 |
Cryptography - Hashes and Passwords |
8.9 |
Cryptography - Random Numbers and Entropy |
8.10 |
Cryptography - Forward Secrecy and TLS |
8.11 |
Cryptography - Libraries (Libsodium) |
8.12 |
Cryptography - Developer Mistakes |
8.13 |
Cryptography - Developer Best Practices |
9 |
Project 2 |
10.1 |
Authentication - Intro |
10.2 |
Authentication - Passwords |
10.3 |
Authentication - Tokens and Certificates |
10.4 |
Authentication - 2FA |
10.5 |
Authentication - OAuth |
10.6 |
Authentication - Kerberos |
10.7 |
Authentication - Biometrics |
11 |
Audit |
12 |
Software Deadly Sins |