Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Zero Trust Architecture: Myths and Realities
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Data Protection and Cybersecurity Essentials
Explores data breaches, cyber attacks, legal requirements, incident response, communication strategies, cybersecurity skills gap, and Swiss government activities.
Sustainable IT Strategies: Forum SI 2024
Discusses sustainable IT practices and strategies presented at the Forum SI 2024 at EPFL.
Network Security - DNS spoofing
Covers DNS spoofing attacks, defenses using DNSSEC, and the importance of origin authentication.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Network Security: ARP Spoofing
Delves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Malware: Types, Defense, and Botnets
Explores various malware types, spread mechanisms, defense strategies, and network security implications.
Engineering Multi-Scale Systems
Introduces the Swiss Research Program focused on engineering multi-scale systems for health, security, energy, and the environment.
Redox Reactions: Half-Reactions, Potentials, and Applications
Explores redox reactions, electrode potentials, and their practical uses in electrochemistry.