Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Zero Days Vulnerability: Security Breaches on Personal Devices
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Software Security Vulnerabilities: Case Studies
Explores various software security vulnerabilities and the challenges of testing large codebases.
Information Security Basics
Covers information security basics, cyber attacks myths, and civil society opportunities.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Software security - Security testing
Covers software security testing approaches and coverage metrics.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Data Science: Python for Engineers - Part II
Explores data wrangling, numerical data handling, and scientific visualization using Python for engineers.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.