Computer Security was a
Level 9 course given in Semester 2.
See the
Course Catalogue entry.
Lectures were held on Mondays and Thursdays at 16:10, in
Lecture Theatre 183, Old College.
1. | 16 Jan. | Security landscape | view | |||
2. | 17 Jan. | Cryptography basics | view | |||
3. | 21 Jan. | Hash functions | view | |||
4. | 24 Jan. | Symmetric cryptography | view | |||
5. | 28 Jan. | Asymmetric cryptography | view | |||
6. | 31 Jan. | Digital signatures | view | |||
7. | 7 Feb. | Protocols I | view | |||
8. | 11 Feb. | Protocols II | view | |||
9. | 13 Feb. | Security models | view | |||
10. | 28 Feb. | Network and Internet vulnerabilities | view | |||
11. | 4 Mar. | Email and web security | view | |||
12. | 7 Mar. | Network and Internet defences | view | |||
13. | 11 Mar. | Programming securely | view | |||
14. | 14 Mar. | Programming securely II | view | |||
15. | 18 Mar. | Usable Security | view | |||
16. | 26 Mar. | Attack landscape and summary | view |
Copyright: except where stated,
lecture notes and other course
materials are Copyright (C) School of Informatics, University of
Edinburgh, and respective authors.
Lecture slides prepared by David Aspinall, with
additions by Mike Just and Julian Bradfield.
Please respect our rights over this material and contact us
if you want to use it in another context.
Informatics Forum, 10 Crichton Street, Edinburgh, EH8 9AB, Scotland, UK
Tel: +44 131 651 5661, Fax: +44 131 651 1426, E-mail: school-office@inf.ed.ac.uk Please contact our webadmin with any comments or corrections. Logging and Cookies Unless explicitly stated otherwise, all material is copyright © The University of Edinburgh |