Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Security hacker
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (31)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Watermarking: Hide Invisible Digital Signature
Explores the concept of hiding an invisible digital signature within media and the challenges of robustness and imperceptibility in watermarking.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Data Science: Python for Engineers - Part II
Explores data wrangling, numerical data handling, and scientific visualization using Python for engineers.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Network Security: DoS and Privacy Introduction
Explores network security, DoS attacks, privacy importance, and practical defense strategies against cyber threats.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.