IERG4130 Introduction to Cyber Security

Fall Semester, 2021 - 22


Instructor: Prof. WU Daoyuan

Email: dywu [AT]

Office Hour: 3:00pm - 4:00pm, Tuesday at SHB814 or on Zoom

Teaching Assistants: Mr. YI Xiao, Mr. SONG Zirui, Mr. ZHOU Yutong, Mr. YANG Fan

Email: yx019, sz019, zy319, yf020 [AT]

Office Hour: see the details in lecture2-supplement.pdf

  • YI Xiao: 3:00pm - 4:00pm, Friday at SHB 826B or on Zoom

  • SONG Zirui: 10:00am - 11:00am, Wednesday at SHB 725/726 or on Zoom

  • ZHOU Yutong: 10:00am - 11:00am, Thursday at SHB 725/726 or on Zoom

  • YANG Fan: 3:00am - 4:00pm, Monday at SHB 725/726 or on Zoom

Lecture Time: 11:30 - 13:15, Tuesday; 13:30 - 14:15, Thursday (see detailed dates in the schedule page)

Lecture Venue: Science Centre L1 (Tuesday); Mong Man Wai Bldg LT1 (Thursday)
(Zoom meetings available on the course Blackboard page ONLY for those who are verified not able to attend F2F)

Tutorial Time and Venue: you just need to attend one each week. (see lecture2-supplement.pdf)

  • Two F2F Sessions:

  • Wed 15:30-16:15 9/15                YIA_201 (Yasumoto International Academic; confirmed)
    Wed 15:30-16:15 9/29 -12/1      SC_L5 (Science Centre L5 2/F; confirmed)

  • Thu 16:30-17:15 9/16 -10/7        SC_L3 (Science Centre L3 1/F; confirmed)
    Thu 16:30-17:15 10/21-12/2      SC_L3 (Science Centre L3 1/F; confirmed)

  • One Zoom Session:

  • Thu 20:00-20:45 9/16 - 12/2      Use different TAs' office hour Zoom links (see lecture2.pdf P2)


  • Sep 1, 2021: The course website is online. Welcome to IERG4130.

Course Description

Cyber Security is an important topic in modern information and communication technology.
This course introduces students to major areas of Cyber Security, including introductions to cryptography, network security, computer security, and web security.

Advisory: Basic knowledge on Computer Networks are suggested.

(This is the description copied from CUSIS.)

Textbooks and Papers

In this course, we will use the following materials:

  • [Main textbook] Computer & Internet Security: A Hands-on Approach (Second Edition);

  • [Second book] Introduction to Modern Cryptography (By Mihir Bellare and Phillip Rogaway);

  • [Internet] Google, Wikipedia, and some academic papers (e.g., from the CCS/IMC/AsiaCCS conferences).

Learning Outcomes

At the end of the course, participants will:

  • Gain a comprehensive overview of cybersecurity;

  • Obtain the essential knowledge about cryptography;

  • Understand protocols used to protect network security;

  • Have a good understanding of web and software security.

Learning Activities and Assessments

  1. Four written assignments 20%: two for cryptography and two for network security.

  2. An individual lab 20%: one half about web and the other half about software security.

  3. Final course examination 40%: Students need to attend the final examination at the end of the course.

Assessment Scheme

Method of Assessment Weight (%)
Four individual written assignments 40
Individual lab on web and software security 20
Final course examination (open lecture notes) 40