Recent changes
Login
Useful resources
Books:
Security Engineering
by Ross Anderson
Applied Cryptography
by Bruce Schneier
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Second Edition
by Paul C. van Oorschot
Similar lectures
Computer & Network Security
by William Enck
Advanced Topics in Computer Science: Privacy Technologies
by Arvind Narayanan
Introduction to Computer Security
by Pavel Laskov
External Link
Tutorials
Introduction to cryptography
by John Mason
Paper
Eternal War in Memory
Lectures
Lecture 01 - Introduction
Lecture 02 - Cryptography
Lecture 03 - Hardware Security
Lecture 04 - Access Control
Lecture 05 - Authentication and Key Establishment
Lecture 06 - Application Security
Lecture 07 - Operating System Security
Lecture 08 - Network Security
Lecture 09 - Web Security
Lecture 10 - Privacy Preserving Technologies
Lecture 11 - Forensics
Labs
Kernel development
Lab 01 - Introduction
Lab 02 - Cryptography
Lab 03 - Hardware Security
Lab 04 - Authentication in Linux
Lab 04 - Authentication (bonus)
Lab 05 - Access control
Lab 06 - Application Security
Lab 07 - Operating System Security
Lab 08 - Network Security
Lab 09 - Web Security
Lab 10 - Forensics
Lab 11 - Privacy Technologies
Lab 12 - Security and Machine Learning
Support
Useful resources
Virtual Machine
isc/info/resources.txt ยท Last modified: 2022/11/15 00:08 by mihai.chiroiu
Old revisions
Media Manager
Back to top