JANUARY |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
8
During the class:
Course overview. |
9
|
10
Before the class:
- Connect to the course on Canvas.
- Learn about academic integrity by studying UBC’s Policy on Academic Misconduct and information resources provided at “Understand Academic Integrity“.
- Study the course syllabus.
- Study and prepare to be quizzed on buffer overflow:
- Vulnerability and Exploits (watch from 25:45 to the end)
- Countermeasures (watch from 25:43 to 43:48)
Learning objectives:
- Academic Integrity
- Buffer Overflow
During the class:
- Course overview.
- Quiz on the knowledge of the course syllabus and academic integrity.
|
11
|
12
No Lab session |
2 |
15
Topic: Buffer Overflow
Before the class:
- Make sure you can connect to the course on Canvas to be able to take the Entrance Quiz during the class.
- Study and prepare to be quizzed on buffer overflow:
- Vulnerability and Exploits (watch from 25:45 to the end)
- Countermeasures (watch from 25:43 to 43:48)
- Study and prepare to be quizzed on the Basics of the Economics of Cybersecurity (42m)
-
- Study A brief history (8m).
- Study Introduction to economics (10m).
- Study The economics of information goods (13m).
- Study Security from an economic perspective (11m),
- Optionally, read a detailed analysis of a buffer overflow vulnerability in an earlier version of WhatsApp.
Learning Objectives:
- Buffer Overflow
- Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Entrance Quiz on Buffer Overflow and Basics of the Economics of Cybersecurity
- Presentations of term projects from previous cohorts.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours. |
16
|
17
Topic: Introduction to Cybersecurity
Before the class:
- Study sections 1.1-1.6 & 1.8 of Chapter 1 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Introduction to Cybersecurity
Attention: this class is held on Zoom due to weather conditions.
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
18 |
19
Lab session:
- In-class assignment on Introduction to Cybersecurity,
- Overview of home assignment 1.
|
3 |
22
Topic: Principles of Designing Secure Systems
Before the class:
- Study section 1.7 of Section 1.7 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Design Principles
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours. |
23 |
24
Topic: Introduction to Cryptography
Before the class:
- Study Cryptography 101: Goals, Basics, Substitution Ciphers
- Study all micro-modules of ancient cryptography and Ciphers modules.
- Study Stamp Sections 2.1–2.3, 2.6, 2.7. Feel free to supplement the reading with Stamp video lectures on on the corresponding sections.
- Study Vigenere cipher by reading Anderson Section 5.2.1.
- Get clear understanding of confusion and diffusion properties of ciphers by studying this short explanation.
- Optionally, read about the History of Classic Crypto (Stamp 2.4).
Learning Objectives: Introduction to Cryptography
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
25
Due: Assignment 1: Risk Analysis. See Canvas for submission instructions and deadline details. |
26
Lab session:
- In-class assignment on cryptography,
- Overview of home assignment 2
|
4 |
29
Topic: Hash Functions
Before class:
- Study Modern Crypto History: Read Stamp 2.5 on the history of modern crypto.
- Study Taxonomy of Cryptography (Stamp 2.6) and Taxonomy of Cryptanalysis (Stamp 2.7).
- Study Non-cryptographic Hash Functions Stamp Section 5.5.
- Study Random Oracle model and its version for hash functions:
- Anderson: Section 5.3 (introduction & 5.3.1).
- Slides 2 & 3 on hash functions in Random Oracle in Pictures.
- Study properties of hash functions: Stamp: Sections 5.1 & 5.2. Feel free to supplement the reading with a video of Stamp’s lecture on Hash Function properties.
- Study Cryptographic hash functions: video Lecture 1.1 (first 21 minutes) of this video material on Cryptocurrencies.
Learning Objectives: Hash Functions
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
- Presentation of “YouShallNotPass!”, a design project from 2022 cohort.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
|
30 |
31
Topic: Modern Stream and Block Ciphers
Before the class:
(most videos are short)
- Optionally, view this gentle introduction into stream ciphers, videos 1, 2, 3,
- Study Random Oracle model and its version for stream and block ciphers:
- Anderson: Sections 5.3.2 (first 2 paragraphs) and 5.3.3 (first 3 paragraphs).
- Slides 4 & 6 in Random Oracle in Pictures.
- Study Stamp Sections 3.1 and introductory text in 3.2 (but not 3.2.1 or 3.2.2). Feel free to supplement the reading with Stamp video lectures: parts 1& 2 from Chapter 3.
- Study random number generators: video 1, and Stamp’s lecture on Random Numbers in Cryptography.
- Study required properties of block ciphers (5m).
- Study AES:
- Stamp Section 3.3.4, feel free to compliment it with viewing Stamp’s lecture on AES.
- AES animation demo (enjoy the soundtrack).
- Videos 1, 2, 5, 11, 12, 13 on the mechanics of AES.
- Bonus material: Study A5/1 cipher
- Pages 7-10 of the slides.
- Video animation of A5/1.
- Optionally, watch the rest of the video lectures on AES (3, 4, 6, 7, 8, 9, 10, 14, 15) from applied crypto playlist.
Learning Objectives: Modern Stream and Block Ciphers
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
February 1
|
February 2
Optional Lab session:
Bring your term project ideas to present and discuss with others and with the TA. |
|
|
February |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
5 |
5
Topic: Modes of Operation for Block Ciphers
Before the class:
- Study Stamp Section 3.3.6. (Feel free to supplement the reading with Stamp video lectures: parts 8 & 9 of Chapter 3.)
- Study conventional modes of operations for block ciphers:
- ECB, CBC, and CTR, and optionally: CFB.
- Study Integrity with MAC: Stamp Section 3.4.
- Study advanced modes of operation: CCM (minutes 36-42 of the video) and GCM.
Learning Objectives: Modes of Operation for Block Ciphers
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
- Presentation of “PassGate”, a design project from 2022 cohort.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
|
6 |
7
Topic: Review of the modules on Hash Functions, Stream and Block Ciphers, and Modes of Operation for Block Ciphers
Before the class:
Review your notes from studying the above three modules. If necessary revisit the study material for those modules.
Learning Objectives: Hash Functions, Stream and Block Ciphers, and Modes of Operation for Block Ciphers
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
8
Due: Assignment 2: Cryptanalysis. See Canvas for submission instructions and deadline details.
|
9
Optional Lab session:
Bring your term project ideas to present and discuss with others and with the TA. |
6 |
12
Topic: Public Key Cryptography
Before the class:
- View an introduction to Diffie-Hellman (DH) key establishment scheme with this very affordable video.
- Study version of Random Oracle model for public key encryption: Anderson: Section 5.3.4.
- Study Stamp Chapter 4, all sections except 4.3.2, 4.3.3, 4.5, 4.9 (which are optional), and 4.11. Feel free to supplement the reading with Stamp video lectures on Chapter 4.
Learning Objectives: Public Key Cryptography
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours. |
13
|
14
In the class:
Term project proposals presentations
After the class:
Due: Term Project Proposal. See Canvas for submission instructions and deadline details. |
15 |
16
Lab session
Review of sample questions for midterm exam. |
7 |
19
No classes. Midterm break.
|
20
No classes. Midterm break.
|
21
No classes. Midterm break. |
22
No classes. Midterm break. |
23
No lab. Midterm break. |
8 |
26
During the class:
Mid-term exam
The exam is on all the material studied until the exam.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
|
27 |
28
Topic: Simplified Authentication and Key Establishment Protocols
Before the class:
- Study Stamp Chapter 9 (except for Sections 9.5, 9.8). Feel free to supplement the reading with Stamp video lectures on Chapter 9.
- Bonus Material: Stamp Section 9.5 on Zero Knowledge Proofs.
Learning Objectives: Simplified Authentication and Key Establishment Protocols
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
29
|
March 1
Lab session:
- In-class part (on coin mining) of Assignment 3.
- Overview of home part (Secure VPN) of Assignment 3.
|
|
|
march |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
9 |
4
Topics: Designing and Building (More) Secure Software
Before the class:
- Study the following parts of Software Security Lecture 4:
- Security Requirements and Abuse Cases (26m46s-30m14s).
- Design Flaws (30m20s-32m46s).
- Top Design Flaws (1h07m18s-1h16m30s).
- VSFTPD case study (1h16m30s-1h27m45s).
- Bonus Material: study Web (in)Security.
Learning Objectives: Designing and Building (More) Secure Software
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
3:00–3:45 PM:
Instructor’s Zoom-only Office Hours. |
5 |
6
Topic: Real World Security Protocols
Before the class:
- Study Stamp Sections 10.1-10.3, 10.5 – 10.8. You can compliment your reading with Stamp video lectures on Chapter 10.
- Study WEP vs. WPA explanation.
- Optionally, study an explanation of the differences between SSL (aka TLS 1.2) and TLS 1.3 (18 minutes).
Learning Objectives: Real World Security Protocols
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
- Midterm anonymous feedback for the teaching staff.
|
7
|
8
No Lab session |
10 |
11
Topic: Case Study: Bitcoin (Part 1)
Before the class:
- Study 1. Introduction to Bitcoin and Blockchain Cryptography (from 20th minute of the video to the end) (38 minutes).
- Study 2. How Bitcoin Achieves Decentralization (1h14m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
|
12 |
13
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Study the following video lectures on the economics of cybersecurity:
Part 2: Security Metrics (39m)
- Study What to measure? (9m).
- Study Measuring security levels (9m).
- Study Metrics in practice (9m).
- Study Metrics from incident data (12m).
Part 3: Security Investment and Risk Management (47m)
- Study Information security strategy (11m).
- Study Information security investment (10m).
- Study Risk management (13m).
- Study Operational security management (13m).
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
14
Due: Assignment 3: Secure VPN. See Canvas for submission instructions and deadline details. |
15
Online Lab session
- In-class part (Topic TBD) of Assignment 4,
- Overview of home part (Topic TBD) of Assignment 4.
- Introduction of (bonus) coin mining contest.5 PM:
coin-mining contest starts
|
11 |
18
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Study video lectures on the economics of cybersecurity (continued):
Part 4: Market Failures (43m)
- Study Market failures (12m).
- Study Policy interventions (13m).
- Study Case study 1: Information sharing in incident response (8m).
- Study Case study 2: payment card security (10m).
Part 5: Behavioural research into security & Policy Implications (38m)
- Study Prospect Theory (10m).
- Study Heuristics and social persuasion (16m),
- Study Behavioural economics of privacy (12m).
- Optionally: Consumer behaviour and deception,
- Optionally: Security economics and policy.
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours. |
19 |
20
Topic: Authentication of Humans to Computers
Before the class:
- Study all sections of Stamp Chapter 6 “Authentication” (Feel free to compliment your reading with Stamp video lectures on the chapter).
- Study “After-action report – learning from the mistakes we’ve made with passwords” by Dr. Cormac Herley (1h13m).
- Study 5 –Usable Authentication (49m).
Learning Objectives: Authentication of Humans to Computers
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
21
|
22
Lab session (UPS):
- In class assignment 5 on UPS.
- Overview of home part of assignment 5 on UPS.
|
12 |
25
Topic: Usable Privacy and Security (UPS) (Part 1)
Before the class:
- Study 1 — Introduction (56m).
- Optionally, watch 2 — Design.
- Study 3 — Evaluating usable security design (1h13m).
- Study Neilsen’s Usability Heuristics.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–1:45 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
|
26 |
27
Topic: Usable Privacy and Security (UPS) (Part 2)
Before the class:
- Study 4 — Guidelines for Secure Interaction Design (58m).
- Optionally: Read Section 3 (“Design Principles”) of User Interaction Design for Secure Systems by Ka-Ping Yee.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
28
Due: Assignment 4 Market Failures.
See Canvas for submission instructions and deadline details. |
29
No classes. UBC Closed. |
|
|
april |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
13 |
1
No classes. University closed. |
2
Deadline for submitting pre-final drafts of term project reports. |
3
Topic: Case Study: Bitcoin (Part 2)
Before the class:
- Study 3. Mechanics of Bitcoin (1h20m).
- Study 4. How to Store and Use Bitcoins (Section 4.7 “Currency Exchange Markets” is optional) (1h05m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
9PM:
coin-mining contest ends |
4
Due: Assignment 5: UPS.
See Canvas for submission instructions and deadline details. |
5
No Lab session |
14 |
8
Topic: Case Study: Bitcoin (Part 3)
Before the class:
- Study 6. Bitcoin and Anonymity (all parts except for 6.5 “Zerocoin & Zerocash” ) (1h20m).
- Optionally, watch 7. Bitcoin Community, Politics, and Regulation.
- Optionally, watch 10. Altcoins and the Cryptocurrency Ecosystem (1h5m).
- Optionally: watch 5. Bitcoin Mining
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
Term Project Video ClipsTerm Project Video Clips Due
(See Canvas for time and submission instructions). |
9 |
10
During the class:
- Guest talk by Andria Selinger, Cyberium.
- Where to go from here.
- Mini-conference, term project reports, and final exam Q&A.
- Course anonymous feedback survey.
|
11 |
12
2-5:45 PM
Course mini-conference with term project presentations.
Location: MCLD 3038 |
15 |
15
Term Project Report Final Version Due (See Canvas for time and submission instructions).
12:45–2:00 PM:
Instructor’s Zoom Office Hours. |
16
|
17
|
18 |
19
|
16 |
22
12:45–2:00 PM:
Instructor’s Zoom Office Hours. |
23
12-2:30 PM Final Exam |
24 |
25 |
26 |