Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Common Vulnerabilities and Exposures
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (20)
Login to filter by course
Login to filter by course
Reset
Previous
Page 1 of 2
Next
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Malware: Introduction
Introduces the basics of malware, its distribution, reasons for its rise, and taxonomy.
Excessive Permissions: Mobile Apps Security
Explores the risks of mobile apps with exaggerated permissions and defense strategies.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Email Security: Best Practices
Delves into email security statistics, filtering techniques, Cisco Email Security Appliance, authentication, web application access control, vulnerabilities, and antivirus infrastructure migration.
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Information Security Basics
Covers information security basics, cyber attacks myths, and civil society opportunities.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.