| Software Security | ||||
| Linux Security Basics | Video-A:01 | Slides | Problems | -- |
| Set-UID Programs | Video-A:02 | Slides | Problems | Lab |
| Environment Variables and Attacks | Video-A:02 | Slides | Problems | Lab |
| Buffer Overflow Attack | Video-A:04 | Slides | Problems | Lab1, Lab2 |
| Return-to-libc Attack and ROP | Video-A:05 | Slides | Problems | Lab |
| Format String Vulnerability | Video-A:09 | Slides | Problems | Lab |
| Race Condition Vulnerability | Video-A:06 | Slides | Problems | Lab |
| Dirty COW | Video-A:07 | Slides | Problems | Lab |
| Shellcode | Video-A:04 | Slides | Problems | Lab |
| Web Security | ||||
| Web Security Basics | Video-C:01 | Slides | Problems | -- |
| Cross-Site Request Forgery Attack | Video-C:02 | Slides | Problems | Lab |
| Cross-Site Scripting Attack | Video-C:03 | Slides | Problems | Lab |
| SQL Injection Attack | Video-C:04 | Slides | Problems | Lab |
| Clickjacking Attack | Video-C:05 | Slides | Problems | Lab |
| Shellshock Attack | Video-A:03 | Slides | Problems | Lab |
| Hardware Security | ||||
| Meltdown Attack | Video-A:08 | Slides | Problems | Lab |
| Spectre Attack | Video-A:08 | Slides | Problems | Lab |
| Network Security | ||||
| Network Security Basics | Video-B:01 | Slides | Problems | Lab |
| MAC Layer and Attacks | Video-B:03 | Slides | Problems | Lab |
| IP Layer and Attacks | Video-B:04 | Slides | Problems | Lab |
| Packet Sniffing & Spoofing | Video-B:02 | Slides | Problems | Lab |
| UDP and Attacks | Video-B:05 | Slides | Problems | -- |
| TCP and Attacks | Video-B:06 | Slides | Problems | Lab1, Lab2 |
| Firewall | Video-B:09 | Slides | Problems | Lab |
| Virtual Private Network | Video-B:08 | Slides | Problems | Lab1, Lab2 |
| Tunneling and Firewall Evasion | -- | Slides | Problems | Lab |
| DNS and Attacks | Video-B:07 | Slides | Problems | Lab1, Lab2, Lab3, Lab4 |
| DNSSEC | -- | Slides | -- | Lab |
| BGP and Attacks | Video-B:10 | Slides | Problems | Lab |
| The Heartbleed Bug and Attack | Video-B:11 | Slides | Problems | Lab |
| Reverse Shell | Video-B:06 | Slides | Problems | - |
| Morris Worm (a future chapter) | Video | -- | -- | Lab |
| Cryptography | ||||
| Secret-Key Encryption | Video-D:02 | Slides | Problems | Lab |
| One-Way Hash Function | Video-D:03 | Slides | Problems | Lab1, Lab2 |
| Public Key Cryptography | Video-D:04 | Slides | Problems | Lab |
| PKI: Public Key Infrastructure | Video-D:05 | Slides | Problems | Lab |
| TLS: Transport Layer Security | Video-D:06 | Slides | Problems | Lab |
| Bitcoin and Blockchain | Video-D:07 | Slides | Problems | - |
| Ethereum Blockchain (a future chapter) | -- | -- | -- | Lab |
Note to instructors: solutions to the problems will only be given to the instructors who have adopted the book as a required text (any version and any edition) in their courses. You can use your course syllabus as a proof.