Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Introduction to Cybersecurity
Graph Chatbot
Related lectures (29)
Previous
Page 3 of 3
Next
Phishing: Recognizing Email Scams
Covers how to recognize email scams, including impersonal signatures and urgent messages.
Untitled
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Untitled
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Password Security
Emphasizes the importance of creating secure passwords and safeguarding credentials.
Authentication: Basics
Covers the process of verifying identity, traditional methods like passwords, and modern approaches such as biometrics.
The Period Finding Algorithm
Explores the Quantum Phase Estimation method for finding the period of a function using an oracle.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.