Week
Date
Lecture
Notes
Resources
1
Introduction
3
Symmetric Cryptography, Hash Functions and Protocols
4
Public-key Cryptography, Digital Signatures and Protocols
5
Network Insecurity
6
Network Security
Reading Week