Recent changes
Login
Useful resources
Lecture's book:
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Second Edition
by Paul C. van Oorschot
Other books:
Security Engineering
by Ross Anderson
Applied Cryptography
by Bruce Schneier
Similar lectures
Computer & Network Security
by William Enck
Advanced Topics in Computer Science: Privacy Technologies
by Arvind Narayanan
Introduction to Computer Security
by Pavel Laskov
Tutorials
Introduction to cryptography
by John Mason
Papers
Eternal War in Memory
Lectures
Lecture 01 - Introduction
Lecture 02 - Cryptography
Lecture 03 - Authentication and Key Establishment
Lecture 04 - Authorization
Lecture 05 - Application Security
Lecture 06 - Malware
Lecture 07 - Web Security
Lecture 08 - Local Network Security
Lecture 09 - Public Key Infrastructure
Lecture 10 - Tunnels. Remote Security.
Lecture 11 - Privacy
Lecture 12 - Hardware Security
Labs
Lab 01 - Introduction
Lab 02 - Cryptography
Lab 03 - Authentication in Linux
Lab 04 - Access control
Lab 05 - Application Security
Lab 06 - Malware
Lab 07 - Web Security
Lab 08 - Network Security
Lab 09 - Public Key Infrastructure
Lab 10 - Tunnels. Remote Network Security
Lab 11 - Privacy Technologies
Lab 12 - Machine Learning Security
Support
Practical Exam Guidelines
Useful resources
Virtual Machine
isc/info/resources.txt ยท Last modified: 2024/10/14 11:20 by mihai.chiroiu
Old revisions
Media Manager
Back to top