Lectures

Lecture videos and other lecture resources are available via links on these pages or via Minerva.

Slides & code examples are provided for personal use only; please do not upload this material anywhere.

  1. Introduction
  2. Threat Modelling
  3. Message Authentication
  4. Symmetric Ciphers
  5. Public Key Cryptography
  6. Randomness
  7. User Authentication
  8. TCP/IP Networking Threats
  9. Network Defences
  10. DNS, ARP & Application Protocols
  11. Malicious Software
  12. Command Injection & Input Validation
  13. Buffer Overruns
  14. Other Low-Level Vulnerabilities
  15. Web App Vulnerabilities
  16. More Web App Vulnerabilities
  17. Managing & Avoiding Vulnerabilities
  18. Intrusion Detection & Incident Response