These videos and slides are for the Spring 2025 offering of a course in the MSD program at the University of Utah. Much of the course content (especially for networking, and including some diagrams in the slides) is based on the textbook Computer Networking: A Top-Down Approach 8th edition by Jim Kurose and Keith Ross (2020). The overall course plan and much of the specific content was developed by Ben Jones and Sneha Kasera. If you are an instructor, feel free to use this material for your own courses; slide sources are on GitHub; contact me for more sources or any questions.
topic | videos | slides | code shown in videos |
---|---|---|---|
Introduction | videos | slides | |
Network Delays | videos | slides | |
Application Layer | videos | slides | |
UDP and DNS | videos | slides | server Main.java client Main.java |
Reliable Data Transfer | videos | slides | |
TCP | videos | slides | server Main.java client Main.java |
Congestion Control | videos | slides | |
Network Layer Organization | videos | slides | |
Network Layer Data Plane | videos | slides | Client.java |
Network Layer Control Plane | videos | slides | |
Link Layer LANs | videos | slides | |
Link Layer to Phycial Layer | videos | slides | |
Cryptography | videos | slides | CodeBreaker |
Stream Ciphers | videos | slides | |
Block Ciphers | videos | slides | |
Hash Functions | videos | slides | |
Public Key Cryptography | videos | slides | rsa.py |
More Cryptography | videos | slides | x25519.c use_one_way.py |
Authentication Protocols | videos | slides | |
TLS | videos | slides | client Main.java |
VPNs, IPSec, and Tor | videos | slides | Main.java |
Wireless Security and Regulation | videos | slides | |
Buffer Overflow | videos | slides | |
Tools for Executables | videos | slides | |
Return-Oriented Programming | videos | slides | rop.zip |
Code Injection | videos | slides | server_db.js |
Side Channels | videos | slides | |
Meltdown and Spectre | videos | slides | sum.c |
Denial of Service | videos | slides | |
Firewalls | videos | slides | |
Access Control | videos | slides | |
Malware and Intrusion Detection | videos | slides | |
Isolation | videos | slides | |
Blockchains | videos | slides |