From 9f938e4cb22ee30463e69a274b6693cc02bb473b Mon Sep 17 00:00:00 2001 From: Noah Lingawakad Date: Sun, 25 Oct 2015 14:00:26 -0400 Subject: [PATCH] Update Security Section Added courses from Stanford, Berkeley; fixed icons --- README.md | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index f46e6ef..9d2c978 100644 --- a/README.md +++ b/README.md @@ -558,26 +558,36 @@ Topics covered include probability theory and Bayesian inference; univariate dis ------- ###Security -- [6.857](http://courses.csail.mit.edu/6.857/2015/) **Computer and Network Security** *MIT* Lecture Notes +- [6.857](http://courses.csail.mit.edu/6.857/2015/) **Computer and Network Security** *MIT* Lecture Notes - Emphasis on applied cryptography and may include: basic notion of systems security, crypotographic hash functions, symmetric crypotography (one-time pad, stream ciphers, block ciphers), cryptanalysis, secret-sharing, authentication codes, public-key cryptography (encryption, digital signatures), public-key attacks, web browser security, biometrics, electronic cash, viruses, electronic voting, Assignments include a group final project. Topics may vary year to year. [Lecture Notes](http://courses.csail.mit.edu/6.857/2015/handouts) [References](http://courses.csail.mit.edu/6.857/2015/references) -- [6.858](http://css.csail.mit.edu/6.858/2014/) **Computer Systems Security** *MIT* Lecture Videos Lecture Notes Assignments Readings +- [6.858](http://css.csail.mit.edu/6.858/2014/) **Computer Systems Security** *MIT* Lecture Videos Lecture Notes Assignments Readings - Design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. - Taught by [James Mickens](http://research.microsoft.com/en-us/people/mickens/) and [Nickolai Zeldovich](http://people.csail.mit.edu/nickolai/) - [Video Lectures and Labs](http://css.csail.mit.edu/6.858/2014/schedule.html) - [Quizzes](http://css.csail.mit.edu/6.858/2014/quiz.html) - [Readings](http://css.csail.mit.edu/6.858/2014/reference.html) - [Final Projects](http://css.csail.mit.edu/6.858/2014/projects.html) -- [CIS 4930 / CIS 5930](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/) **Offensive Computer Security** *Florida State University* Lecture Videos Assignments Lecture Notes +- [CIS 4930 / CIS 5930](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/) **Offensive Computer Security** *Florida State University* Lecture Videos Assignments Lecture Notes - Course taught by [W. Owen Redwood](http://ww2.cs.fsu.edu/~redwood/) and [Xiuwen Liu](http://www.cs.fsu.edu/~liux/). It covers a wide range of computer security topics, starting from Secure C Coding and Reverse Engineering to Penetration Testing, Exploitation and Web Application Hacking, both from the defensive and the offensive point of view. - [Lectures and Videos](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html) - [Assignments](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/assignments.html) -- [CS 5430](http://www.cs.cornell.edu/courses/CS5430/2013sp/) **System Security** *Cornell University* Assignments Lecture Notes Readings +- [CS 5430](http://www.cs.cornell.edu/courses/CS5430/2013sp/) **System Security** *Cornell University* Assignments Lecture Notes Readings - This course discusses security for computers and networked information systems. We focus on abstractions, principles, and defenses for implementing military as well as commercial-grade secure systems. - [Syllabus](http://www.cs.cornell.edu/courses/CS5430/2013sp/01.intro.html) - [Lectures](http://www.cs.cornell.edu/courses/CS5430/2013sp/02.outline.html) - [Assignments](http://www.cs.cornell.edu/courses/CS5430/2013sp/) +- [CS 161](http://www-inst.eecs.berkeley.edu/~cs161/sp15/) **Computer Security** *UC Berkeley* Lecture Notes + - Introduction to computer security. Cryptography, including encryption, authentication, hash functions, cryptographic protocols, and applications. Operating system security, access control. Network security, firewalls, viruses, and worms. Software security, defensive programming, and language-based security. Case studies from real-world systems. +- [CS 261](http://www.icir.org/vern/cs261n-Sp14/) **Internet/Network Security** *UC Berkeley* Lecture Notes Readings + - This class aims to provide a thorough grounding in network security suitable for those interested in conducting research in the area, as well as students more generally interested in either security or networking. We will also look at broader issues relating to Internet security for which networking plays a role. Topics include: denial-of-service; capabilities; network intrusion detection; worms; forensics; scanning; traffic analysis / inferring activity; architecture; protocol issues; legality and ethics; web attacks; anonymity; honeypots; botnets; spam; the underground economy; research pitfalls. The course is taught with an emphasis on seminal papers rather than bleeding-edge for a given topic. +- [CS 155](https://courseware.stanford.edu/pg/courses/349991/cs155-spring-2013) **Computer and Network Security** *Stanford* Lecture Notes Readings + - Principles of computer systems security. Attack techniques and how to defend against them. Topics include: network attacks and defenses, operating system holes, application security (web, email, databases), viruses, social engineering attacks, privacy, and digital rights management. Course projects focus on building reliable code. Recommended: Basic Unix. Primarily intended for seniors and first-year graduate students. +- [18-636](https://courseware.stanford.edu/pg/courses/334553/18636-spring-2013) **Browser Security** *Stanford* Lecture Videos Lecture Notes + - The Web continues to grow in popularity as platform for retail transactions, financial services, and rapidly evolving forms of communication. It is becoming an increasingly attractive target for attackers who wish to compromise users' systems or steal data from other sites. Browser vendors must stay ahead of these attacks by providing features that support secure web applications. This course will study vulnerabilities in existing web browsers and the applications they render, as well as new technologies that enable web applications that were never before possible. The material will be largely based on current research problems, and students will be expected to criticize and improve existing defenses. Topics of study include (but are not limited to) browser encryption, JavaScript security, plug-in security, sandboxing, web mashups, and authentication. +- [CS 259](https://courseware.stanford.edu/pg/courses/331628/cs259-winter-2013) **Security Modeling and Analysis** *Stanford* Lecture Notes Assignments Readings + - The course will cover a variety of contemporary network protocols and other systems with security properties. The course goal is to give students hands-on experience in using automated tools and related techniques to analyze and evaluate security mechanisms. To understand security properties and requirements, we will look at several network protocols and their properties, including secrecy, authentication, key establishment, and fairness. In parallel, the course will look at several models and tools used in security analysis and examine their advantages and limitations. In addition to fully automated finite-state model checking techniques, we will also study other approaches, such as constraint solving, process algebras, protocol logics, probabilistic model checking, game theory, and executable models based on logic programming. -------