Key concepts
Data Bias
- Data Correctness
- Descriptively/Normatively Correct/Incorrect 8-13
- Why matters 14
- Data Bias
- Selection Bias 15-19
- Annotation Bias 20-24-28
- Role of algorithm 29-31
- Key Takeaways 35
Metadata
- Data v. Information 2
- Data structure 3-5
- Data as Information 6-8
- Metadata
- def 9
- examples 10-14
- Types:
- Descriptive 15-17
- Administrative 18-23
- Use 24-25
- how 28-29
- data sources 30-32
- The Semantic Web 33-38
- FAIR principle 39
————————-
Week2
XML
- Why 2-3
- Def 4-9
- Structure of Well-Formed XML
- Rules of content 10-16
- Rules of tag 17-20-26
- Rules of attribute 29-34
- root, prolog 27-28
- Entity Reference 40-41
- Handling duplications 42-45
- Exercises 35-39, 46-48
- Summary 49
- Valid XML
- Def 50-53
- Why 54
- Explanation 55-61
- Data types 62-63
- XML schema 64-70
————————-
Week3
Distributed System
- Introduction
- Def 3
- Motivation 4
- Characteristics 5-6
- Challenges 7
- Pros & Cons 8
- The Byzantine Generals 9-17
- The Dining Philosophers Problem 18-24
- Examples
- MMORPG 27
- Cloud computing 28-29
- Consensus problem
- What 30-31
- Why difficult 32
- Solutions
- Paxos algorithm 33-34
- Raft 35-43
————————-
Week4
Security Attacks
- Attack types 3-5
- Security requirements 6
History of Cryptography
- Basic idea of cryptography 18
- Caesar, Enigma machine, Book cipher, One-time Pad 10-15
Encryption methods and keys
- Intro
- types of encryption 17
- terminologies 19
- Symmetric encryption – use single key 21
- Stream cipher v. Block cipher 22-25
- Key communication 26-27
- Key reuse 28-30
Public key
- Def 32-34
- Applications 35
- Requirements 36-37
- RSA 38-56 ————————-
- v. Symmetric keys 7
- Session key 8
- Combining symmetric and asymmetric 9-10
Digital signatures 11-27
- Intro 12-14
- Authentication through encryption 15-17
- Digital signing
- def 18-20
- Digital signature 21-22
- Man-in-the-middle attack 23-25
- X.509 26-27
HTTPS (TLS) 28-33
- def 29-30
- Stages 31-33
————————-
Week5
Basic mathematics
- Probability 6-17
- Ensemble 18
- Shannon Information 19
- Entropy 20-21
Compressing data
- Symbol codes
- def 23-27
- requirements 28
- Uniquely decodable
- Easily decodable – prefix code 29-30
- code length 31-41 ————————-
- Huffman codes 6-13
- Stream codes 15-17
Noisy-Channels
- Noisy channel def 19-22
- Error recovery scheme 23
- Joint entropy, conditional entropy, mutual information 25-28
- Channel and carried information 29-36
- Channel capacity 37-38
————————-
Week6
Authentication of users
- Authentication v. Authorization 9-11
- Authentication types
- Browser based
- Basic authentication 14-17
- Digest authentication 18
- Use digital certificate as client 19-20
- Non browser based
- Form based authentication 22-25
- Open standard 26
- 2FA 27-29
- Hardware 30-31
- Browser based
- Session tracking
- def 32
- Cookie 33-41
————————-
Storing and Cracking passwords
- Attack methods
- why 6
- Brute-force attack 7
- Dictionary attack 8-9
- Rainbow tables 13-15
- Social engineering 20-21
- Storing methods
- Hash value 10-12
- Add salt 16-17
- CAPTCHA 23
Web attacks
- Injection 30-34
- Cross-site scripting 36-45
- Cross-site request forgery 46-51 ————————-
- DDoS 15-18
- Protecting your systems 19-27
————————-
Week7
HTTP
JSON & CSV
- Serializing data 2-3
- CSV 7-13
- JSON
- def 14
- Structure 16-20
- XML and JSON 21-24, 30-32
- Javascript JSON 25
- Use in databases 26-29
————————-
Week8
RESTful API
- API 3-11
- Web API 15-17
- REST API
- def 18-19
- Fundamental concepts 20-30
- Resources & Representations 31-39
- Uniform Service Interface 40-45
- Stateless 46
- Hypermedia constraint 47-51
- Application Semantics 52-53
- Media types 60-63
- Self describing
————————-
Week9
AJAX
- def 5-10
- AJAX and browser 11-12
- AJAX and Web services 13-14
- Setting up
- example 16-20
- GET or POST 23-24
- between open and send 25-27
- Handling XML 32-36
- Handling JSON 37-38
————————-
AJAX Security
- SOP 7
- JSONP 8-24
- Access JSON Object 9-10
- Pad JSON Object 11
- FUnctions using JSON 12-14
- Flickr example (Callback) 15-23
- Security concerns 24
- CORS 25-30
- Preflight message 31-33
- General security 34
————————-
Week11
Cloud and Virtualisation
- Building a datacenter
- why 3-4
- defs 5-6
- Physical requirements 7-15
- Topology 16-18
- Failures 19
- Datacenter loads
- Service models 20-22
- Datacenter workloads 23-26
- Big data 27-30
- Hypervisors and virtualization
- def 31, 33-34
- why 32
- pros & cons 35, 43
- VM images 36-37
- Hypervisor 38-40
- Microkernels 41
————————-
Week12
- basics
- trust 8
- ledger 10-11
- blockchain
- def 12
- blockchain and trust 13-14
- transaction 15-16
- verifiable accounting 17-22
- validation 24-25
- verification 27
- blockchain mining 28-32
- 51% attack 33
- proof of stake 34
- proof of authority 35
- applications 37-45
Comments are closed