Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Adversarial Thinking: Reasoning as an Adversary
Graph Chatbot
Related lectures (30)
Previous
Page 2 of 3
Next
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Media Security: Introduction and Overview
Covers the basics of media security, including applications, challenges, and solutions in protecting digital content.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.
Software security - Security testing
Covers software security testing approaches and coverage metrics.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Software Security: Security Testing - Sanitizers
Explores the use of sanitizers in software security testing to detect bugs early and improve testing effectiveness.
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
Cybersecurity: Digital Forensics and Attribution
Explores cyber-kill chain, digital forensics, attribution challenges, and case studies in cybersecurity.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.