Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Cybersecurity: Threat Modeling and Attack Strategies
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
Network Inference from Textual Evidence
Delves into network inference from textual evidence, exploring information propagation, translation, and multi-input attention.
Cybersecurity Ecosystem: Non-Profit Impact
Explores data breaches in non-profits, incident response plans, legal requirements, cybersecurity strategies, and challenges faced by organizations.
Sound & Timbre: Theory and Composition
Explores sound waves, timbre, and music composition through the works of Stockhausen and Penderecki, analyzing harmonic and inharmonic sounds.
Data: Clouds and Things
Covers the fundamentals of data, cloud storage, and the Internet of Things.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Foundations of ICT: Decision Makers
Covers the foundations of ICT for decision makers, focusing on understanding ICT and digital trust topics.
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.