| 1 |
Welcome & Introduction |
| 2 |
Security Policy & Aspects |
| 3 |
Beyond the Attacks |
| 4 |
Goals and Requirements |
| 5 |
Assurance |
| 6 |
Architectural Approaches to Security |
| 7 |
CPU Security: Meltdown and Spectre |
| 8.1 |
Cryptography: Introduction |
| 8.2 |
Cryptography: One-Time Pads |
| 8.3 |
Cryptography: Block Ciphers |
| 8.4 |
Cryptography: Stream Ciphers |
| 8.5 |
Cryptography: Nonce and IV |
| 8.6 |
Cryptography: DH and PKI |
| 8.7 |
Cryptography: Authentication |
| 8.8 |
Cryptography: Hashes and Key Distribution Functions |
| 8.9 |
Cryptography: Random Numbers and Entropy |
| 8.11 |
Cryptography: Libraries |
| 8.12 |
Cryptography: Developer Mistakes |
| 8.13 |
Cryptography: Developer Best Practices |
| 10.1 |
Authentication: Intro |
| 10.2 |
Authentication: Passwords |
| 10.3 |
Authentication: Tokens and Certificates |
| 10.4 |
Authentication: 2FA |
| 10.5 |
Authentication: OAuth |
| 10.6 |
Authentication: Kerberos |
| 10.7 |
Authentication: Biometrics |