Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Zero Trust Architecture: Myths and Realities
Graph Chatbot
Related lectures (30)
Previous
Page 1 of 3
Next
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Cybersecurity: Digital Forensics and Attribution
Explores cyber-kill chain, digital forensics, attribution challenges, and case studies in cybersecurity.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
SCION: Next-Generation Internet Security
Presents SCION, a highly secure and efficient next-generation internet architecture with a focus on security and efficiency.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Man in the Middle: Capsule gagnante
Explores Man in the Middle attacks in public WiFi hotspots and provides defensive strategies against data interception.