Mo | Date | Day | Topic | Homework |
Jan | 14 | W | First Class | |
16 | F | Chapter 1: The Threat Environment | ||
21 | W | Chapter 1 continued | ||
23 | F | Module A: Networking Concepts Review | Chapter 1 | |
28 | W | Module A continued | ||
30 | F | Module A continued | ||
Feb | 4 | W | Chapter 2: Planning and Policy | Module A |
6 | F | Chapter 2 contined | ||
11 | W | Chapter 2 Pau. Start Chapter 3 | ||
13 | F | Chapter 3: Cryptography | Chapter 2 | |
18 | W | Midterm I (Chapters 1 and 2, Module A) | ||
20 | F | Chapter 3 continued (ISSA Luncheon?) | ||
25 | W | Chapter 3 continued | ||
27 | F | Chapter 4: Secure Networks | Chapter 3 | |
Mar | 4 | W | Chapter 4 continued | |
6 | F | Chapter 5: Access Control | ||
11 | W | Chapter 5 continued | ||
13 | F | Chapter 6: Firewalls | ||
18 | W | Midterm II (Chapters 3-5) | ||
20 | F | Chapter 6 continued | ||
25 | W | Spring Recess | ||
27 | F | Spring Recess | ||
April | 1 | W | Chapter 7: Host Security | |
3 | F | Good Friday | ||
8 | W | |||
10 | F | Chapter 7 | ||
15 | W | Chapter 7 conclusion | ||
17 | F | Chapter 8 | Chapter 7 | |
22 | W | Midterm III (Chapters 6-7) | ||
24 | F | |||
29 | W | |||
May | 1 | F | ||
6 | W | Last Class | ||
11 | M | Final Exam, 9:45-11:45 in Regular Classroom |