Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Adversarial Thinking: Common Weaknesses Enumeration
Graph Chatbot
Related lectures (30)
Previous
Page 1 of 3
Next
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
5G Authentication: Security and SUKI
Explores the evolution of 5G authentication, vulnerabilities in 4G, and improvements in 5G security.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
IT Security Challenges
Explores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Network Access Control: Security Overview
Provides an overview of Network Access Control (NAC) and security challenges discussed at the 2022 Forum SI.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.