Wireless Protected Access, Version 2 (WPA2) is the version of Wi-Fi security used in most cases today. This diagram illustrates the general layout of the security data used by WPA2. There’s a new version coming out, WPA3, but it doesn’t seem to be in any products yet.
I put this diagram together several years ago for my textbook. I recently performed a web search for similar diagrams only to realize that there aren’t any posted.
Continue reading WPA2 Packet Frame Format
I’ve signed on to do a Coursera online course on cloud security. I’ll share more details as production progresses. This post contains a few notes on organizing video clips for a large project.
The video almost always consists of two synchronized streams: one of my bearded face narrating the video and the other of animated images, text, and diagrams. This is more complicated than my older video efforts, which consisted of animated presentations with voiceover.
I’ve now learned the value of the famous movie-studio clapperboard slate. I’ve also learned that your file naming process has to blend well with your editing style.
Continue reading Organizing Video Clips for an Online Course
I have posted the fifteenth video in the Cryptosmith Series on practical basic cryptography. The video collection falls into three parts: the network crypto introduction, the DVD example, and the public-key certificate discussion.
There are also updates to other series videos. They now use the acronym “SSL” a lot more, since people recognize it more often than “TLS.” The public-key discussions now include elliptic curve algorithms, since they are very popular in state-of-the-art SSL (TLS) deployments.
An overview and notes about the series appear below. If you take the time to look at these videos, please “like” and/or comment as appropriate.
Continue reading Cryptosmith Video Series #1 through #15
Members of the University of Minnesota’s MSSE Class of 2017: the cybersecurity course (titled “Data and Network Security” or something like that) is one of your options for next spring. After talking with students in the class right now, I’m posting more information about the class.
Continue reading MSSE Cybersecurity Course 2017
I have shut down my online school. It was an interesting experience, but not a cost-effective one. Aside from not getting rich from this, it was really boring to administer a testing program.
On the other hand, I now know an incredible amount about Moodle, the internationally-popular web service for education. I also know how to host an online testing program for much less that commercial vendors charge.
Continue reading Adieu, Online School
Thank you for reviewing Cloud Computing videos!
I’m posting draft videos on my Vimeo site. Here is the link to my Vimeo album:
Try using the following links to watch recently posted videos and interactively review them. Vimeo has kindly let me use their ‘advanced features’ during the month of July, and this is an advanced feature.
- V06 – Step 2, Improved Robustness
- V07 – Step 3, Separated Duties
- V08 – User and Group Permissions
Cryptosmith Institute now offers a second option for earning an NSTISSI 4011 training certificate:
- The original option: Complete exams on the 17 chapters in Elementary Information Security plus a final exam covering all material in the textbook.
- Students who have already taken a college-level cybersecurity course may skip the separate chapter exams and earn the certificate by taking the final exam.
Students interested in the second “streamlined” option must upload a college transcript showing the relevant course before they take the exam.
Continue reading Streamlined NSTISSI 4011 Training Certificate
I am offering a Cybersecurity elective for students registered in the University of Minnesota’s Master of Science in Software Engineering program. As I described in the class on Friday, the course uses the textbook I wrote and does a lot of lab work with security tools, including Wireshark, nmap, Gnu Privacy Guard, and vulnerability scanning.
Here is a link to the 2015 syllabus.
Resources for proposed online course:
The PDP-11 computer, build by Digital Equipment Corporation (DEC) in the late 20th century, was a classic machine of the minicomputer era. At the time of the -11’s introduction, DEC really had no idea what to do about software for its machines, and wasn’t even sure what was appropriate in the way of operating systems.
Continue reading Digital’s RT-11 File System
Here is a summary of memory size names and their corresponding address sizes. Many people memorize this type of information naturally through working with computer technology over time or during a professional career.
Continue reading Kilo mega giga tera