- Section 1 (9/28): Security Reviews [ worksheet]
- Section 2 (10/5): Buffer Overflows [slides | worksheet | solution]
- Section 3 (10/12): Buffer Overflows continued [slides | worksheet | solution | GDB cheat sheet | GDB slides ]
- Section 4 (10/19): Cryptography [worksheet | solution]
- Section 5 (10/26): More Crypto! [slides | worksheet | solution]
- Section 6 (11/2): Lockpicking!
- Section 7 (11/9): Clickjacking [slides | worksheet]
- Section 9 (11/30): Authentication [slides]
- Section 10 (12/7): Does security matter? [slides]