Recent changes
Login
Useful resources
Lecture's book:
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Second Edition
by Paul C. van Oorschot
Other books:
Security Engineering
by Ross Anderson
Applied Cryptography
by Bruce Schneier
Similar lectures
Computer & Network Security
by William Enck
Advanced Topics in Computer Science: Privacy Technologies
by Arvind Narayanan
Introduction to Computer Security
by Pavel Laskov
Tutorials
Introduction to cryptography
by John Mason
PicoCTF Primer (Introduction to CTFs)
Papers
Eternal War in Memory
Lectures
Lecture 01 - Introduction
Lecture 02 - Cryptography
Lecture 03 - Authentication and Key Establishment
Lecture 04 - Authorization
Lecture 05 - Application Security
Lecture 06 - Malware
Lecture 07 - Web Security
Lecture 08 - Local Network Security
Lecture 09 - Public Key Infrastructure
Lecture 10 - Tunnels. Remote Security.
Lecture 11 - Privacy
Lecture 12 - Hardware Security
Labs
Lab 01 - Introduction
Lab 02 - Cryptography
Lab 03 - Authentication in Linux
Lab 04 - Access control
Lab 05 - Application Security
Lab 06 - Malware
Lab 07 - Web Security
Lab 08 - Network Security
Lab 09 - Public Key Infrastructure
Lab 10 - Tunnels. Remote Network Security
Lab 11 - Privacy Technologies
Lab 12 - Machine Learning Security
Support
Practical Exam Guidelines
Useful resources
Virtual Machine
isc/info/resources.txt ยท Last modified: 2025/10/08 17:24 by florin.stancu
Old revisions
Media Manager
Back to top