Assignments and Evaluation

Common Components

All students will be graded by the following components
Component Weight Deadline Submission Details
Assignment 1 10% February 22nd OWL
Assignment 2 10% March 8th March 15th OWL Assignment 2 instructions
Assignment 3 10% March 22nd March 29th OWL Assignment 3 instructions
Presentation 1: Tool/method case study 20% Email proposal to prof by Friday, February 22nd. In class Groups of 2-4 students will select and study a specific hacker/cybersecurity software tool, technique or method not previously covered in the lectures. The group will give a 12-minute presentation of their findings to the class, and if appropriate give a demonstration of the tool/method. The group will also create companion notes which will be placed on the course website.

The companion notes will be submitted to the professor via email as a single Markdown (.md) document prior to the group's scheduled day of presentation. See this tutorial on how to create markdown documents. The notes should contain sufficient information to allow other students to learn about the topic on their own and should include links to suitable reference material.

Presentations will be evaluated on the following criteria:

  • Background Did the presentation adequately explain (a) what the tool/method does, (b) how it does it, (c) who uses it or would want to use it and (d) why it would be useful? (e) what is the real-world impact and significance?
  • Technical merit. Did the topic contain an adequate degree of technical content (e.g., code, data, equations, graphs, charts, etc). Were key concepts explained?
  • Delivery. Was the presentation interesting/engaging/fun/effective? Where the presenters prepared? Were the slides clear and visually appealing? Did the presentation complete on time?
The companion notes will be evaluated on the following criteria:
  • Content. Do the notes make use of a variety of rich content (e.g., hyperlinks, code snippets, etc?)
  • Technical merit. Do the notes contain an adequate degree of technical content (e.g., code, data, equations, graphs, charts, etc). Were key concepts explained?
  • References. Did the group select and cite appropriate references that would allow the reader to get up to speed on the topic?
Presentation 2: Vulnerability/Exploit case study 20% Email proposal to prof by Friday, March 8th In class Groups of 2-4 students will select and study a specific vulnerability and exploit not previously covered in the lectures. The group will give a 12-minute presentation of their findings to the class, and if appropriate give a demonstration of the vulnerability/exploit. The group will also create companion notes which will be placed on the course website.

The companion notes will be submitted to the professor via email as a single Markdown (.md) document prior to the group's scheduled day of presentation. See this tutorial on how to create markdown documents. The notes should contain sufficient information to allow other students to learn about the topic on their own and should include links to suitable reference material.

Presentations and companion notes will be marked with the same criteria as the tool/method presentation above

Final test 30% Monday April 1st Elborne College, room 2155 11:30am-1:30pm