Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Adversarial Thinking: Defender - Threat Modelling
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Basics - Security Engineering Concepts
Covers security mechanisms, defense in depth, and methods to show systems are secure.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.