Which of the lectures struck you as working particularly well, and why?
Which of the lectures struck you as particularly deficient / not working well, and why?
Any other suggestions regarding the lecture aspect of the course?
(Overview/Map; Denial-of-Service; Traceback; Capabilities; Network Intrusion Detection Systems; NIDS Evasion; NIDS Evaluation; The Threat of Worms; Worm Detection/Defense; Scanning; Forensics; Inferring Activity; Anonymity; Architecture; Legality and Ethics; Securing Protocols (2); Authentication; Web Attacks & Defenses; Botnets (2); Spam; Scams (2).)