Navigation auf uzh.ch
Lectures will be held Wednesdays, 10:15 - 11:45 at BIN-2.A.01.
Lecture | Date | Lecturer(s) | Slides 1-up | Slides 6-up | Release Date | Content (keyword(s)) | Remarks and References |
L00 | 21.09 | BS, BR | L00-1up (PDF, 283 KB) | L00-6up (PDF, 211 KB) | 20.09 | Course Introduction and Organization | - |
L01 | 21.09 | BR | L01-1up (PDF, 1 MB) | L01-6up (PDF, 850 KB) | 20.09 | Basic Security Concepts | [1] |
L02 | 28.09 | BR | L02-1up (PDF, 2 MB) | L02-6up (PDF, 1 MB) | 28.09 | Cryptographic Principles | [2] |
L03 | 05.10 | BR | L03-1up (PDF, 2 MB) | L03-6up (PDF, 1 MB) | 04.10 | Security on Different Network Layers | [1,8,9] |
L04 | 12.10 | BR | L04-1up (PDF, 3 MB) | L04-6up (PDF, 1 MB) | 12.10 | Cloud Security | [2,4,10] |
L05 | 19.10 | BS | L05-1up (PDF, 1 MB) | L05-6up (PDF, 1 MB) | 14.10 | Access Control, Firewalls, Policies | [1] |
L06 | 26.10 | L06-1up (PDF, 1 MB) | L06-6up (PDF, 1 MB) | 26.10 | Intrusion Detection and Prevention | [1,11,12] | |
L07 | 02.11 | BR, Melchior Limacher | L07-1up (PDF, 2 MB) | L07-6up (PDF, 1 MB) | 01.11 | Penetration Tests |
[13,14] |
L08 | 09.11 | BR | L08-1up (PDF, 3 MB) | L08-6up (PDF, 1 MB) | 08.11 | Security Information and Event Management | [15.16] |
L09 | 16.11 | AH | L09-1up (PDF, 2 MB) | L09-6up (PDF, 1 MB) | 16.11 | Cybersecurity and Machine Learning | [17,18] |
L10 | 23.11 | AH | L10-1up (PDF, 1 MB) | L10-6up (PDF, 945 KB) | 23.11 | Concerns of Machine and Federated Learning | References within slides |
L11 | 30.11 |
MF, |
L11-1up (PDF, 2 MB) | L11-6up (PDF, 1 MB) | 25.11 | Risk Management and Economics | References within slides |
L12 | 07.12 | BR, GM | L12-1up (PDF, 5 MB) | L12-6up (PDF, 1 MB) | 06.12 | Selected Cybersecurity Topics | [19, 20] |
L13 | 14.12 | BR | L13-1up (PDF, 1 MB) | L13-6up (PDF, 881 KB) | 13.12 | Evaluations and Summary | Content from previous lectures |
L14 | 21.12 | BR | CT01-1up (PDF, 6 MB) | CT01-6up (PDF, 4 MB) | 21.12 | CT Presentation #1 | CT page |
E14 | 22.12 | BR | CT02-1up (PDF, 2 MB) | CT02-6up (PDF, 704 KB) | 22.12 |
CT Presentation #2 Simulated Exam (PDF, 351 KB) (60 mins) |
CT page |
The files provided above may only be downloaded from a subnetwork of the University of Zurich's network. Thus, please use a VPN client from the outside. Information on the VPN setup can be found here. In case you have problems with downloading the files (e.g., showing error 404) check your VPN settings and delete your browser's cache!
References
Several references will be used as a basis during the lectures. However, two major references from W. Stallings below are recommended to provide a basis (seen in lectures L01 and L02) to further specific modules (L03 to L11). Specific references will be pointed out during the lectures or exercise sessions.