| 1 |
Welcome & Introduction |
| 2 |
Policy and Aspects |
| 3 |
Beyond the Attacks |
| 4 |
Goals and Requirements |
| 5 |
Assurance |
| 6 |
Architectural Approaches to Security |
| 7 |
Equifax Fiasco |
| 8.1 |
Cryptography - Intro and Failures |
| 8.2 |
Cryptography - One Time Pads |
| 8.3 |
Cryptography - Block Ciphers |
| 8.4 |
Cryptography - Stream Ciphers |
| 8.5 |
Cryptography - Nonce and IV |
| 8.6 |
Cryptography - Key Exchange and Public Keys |
| 8.7 |
Cryptography - Authentication |
| 8.8 |
Cryptography - Hashes and Passwords |
| 8.9 |
Cryptography - Random Numbers and Entropy |
| 8.10 |
Cryptography - Forward Secrecy and TLS |
| 8.11 |
Cryptography - Libraries (Libsodium) |
| 8.12 |
Cryptography - Developer Mistakes |
| 8.13 |
Cryptography - Developer Best Practices |
| 9 |
Project 2 |
| 10.1 |
Authentication - Intro |
| 10.2 |
Authentication - Passwords |
| 10.3 |
Authentication - Tokens and Certificates |
| 10.4 |
Authentication - 2FA |
| 10.5 |
Authentication - OAuth |
| 10.6 |
Authentication - Kerberos |
| 10.7 |
Authentication - Biometrics |
| 11 |
Audit |
| 12 |
Software Deadly Sins |