Classes are online at


The aim of the course is to make students aware of the security problems of information systems and networks, their mechanisms and technologies of protection, and to understand the parameters that make these protection mechanisms effective in modern systems. Firstly, the basic principles of cryptography are presented, then a number of important applications and practical techniques, and finally cryptographic policy and security management. The lesson includes both theory and hands-on sessions.

Some of the topics we will cover in class:

  • Cryptographic Algorithms & Tools
  • User Authentication
  • Access Control
  • Network Basics & Database Security
  • Malicious Software
  • Denial of Service (DoS) Attacks
  • Intrusion Detection Systems
  • Firewalls
  • Buffer Overflow
  • Software Vulnerabilities
  • Operating System Security
  • Internet Security Protocols


The final grade is calculated as follows:

  • 40% Programming Assignments (1:15%, 2:25% - stands for both 2nd and 3rd exam)

  • 60% Final Exam All exams are given with closed books. During exams you are not allowed to use any kind of notes, books, and communication devices (i.e., mobile phones, tablets, laptops).

10K students
Instructor Prof. Evangelos P. Markatos
Location Online
Instructor's Office Hours Monday 14:00-14:30
Course credits 6 ECTS
Prerequisites CS150
CS345 (Optional, but highly recommended)
CS335 (Optional, but highly recommended)
Book Computer Security - Principles and Practice (3nd Edition)
by William Stallings and Lawrie Brown
Mailing list

Mailing list

Subscribe by sending a mail:
Using the mailing list


Prof. Evangelos P. Markatos markatos [at]

Teaching Assistants

Marchioro Thomas csdp1164 [at]
Pachilakis Michalis mipach [at]
Deyannis Dimitris deyannis [at]
Papadogiannakis Emmanouil papamano [at]
Christou Giorgos christou [at]


Date Lecture
15/2 Introduction
17/2 Chapter 1
1/3 Chapter 2
3/3 Chapter 2
8/3 Chapter 3
10/3 Chapter 3
12/3 Laboratory - Assignment 1: Deadline 9/4
15/3 Clean Monday
17/3 Chapter 5
22/3 Chapter 6
24/3 Chapter 6
29/3 Chapter 6
31/3 Chapter 6
7/4 Chapter 7
9/4 Laboratory - Assignment 2 - Deadline: 14/5
12/4 Chapter 7
14/4 Chapter 8
19/4 Chapter 8
21/4 Chapter 9
10/5 Recitation
12/5 Recitation
17/5 Chapter 10
19/5 Chapter 11
24/5 Chapter 12
26/5 CTF

Slides for the book chapters here


Assignment 1 Simple Cipher Library Due : 9/04
Tutorial 1 Assignment 1 Tutorial
Assignment 2 Access Control Due : 14/05
Tutorial 2 Assignment 2 Tutorial
CTF For the CTF you can create a team up to 5 people. It is recommended to create a communication channel between the people of your team (e.g. skype channel). Further information will be given before the CTF starts.