Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Information security
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (30)
Previous
Page 1 of 3
Next
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Malware: Types, Defense, and Botnets
Explores various malware types, spread mechanisms, defense strategies, and network security implications.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Malware: Introduction
Introduces the basics of malware, its distribution, reasons for its rise, and taxonomy.
Malware: Types of malware
Explores various types of malware, defenses against them, and real-world examples like Stuxnet worm targeting Iran's nuclear power plants.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.
Zero Days Vulnerability: Security Breaches on Personal Devices
Explores zero days vulnerability, ethical hacking, cyber attacks, and defense strategies against cyber threats.