Recent changes
Login
This is an old revision of the document!
Useful resources
Books:
Security Engineering
by Ross Anderson
Applied Cryptography
by Bruce Schneier
Similar lectures
Computer & Network Security
by William Enck
Tutorials
Introduction to cryptography
by John Mason
Paper
Eternal War in Memory
Lectures
Lecture 01 - Introduction
Lecture 02 - Cryptography
Lecture 03 - Authentication and Key Establishment
Lecture 04 - Authorization
Lecture 05 - Application Security
Lecture 06 - Malware
Lecture 07 - Web Security
Lecture 08 - Local Network Security
Lecture 09 - Public Key Infrastructure
Lecture 10 - Tunnels. Remote Security.
Lecture 11 - Privacy
Lecture 12 - Hardware Security
Labs
Lab 01 - Introduction
Lab 02 - Cryptography
Lab 03 - Authentication in Linux
Lab 04 - Access control
Lab 05 - Application Security
Lab 06 - Malware
Lab 07 - Web Security
Lab 08 - Network Security
Lab 09 - Public Key Infrastructure
Lab 10 - Tunnels. Remote Network Security
Lab 11 - Privacy Technologies
Lab 12 - Machine Learning Security
Support
Practical Exam Guidelines
Useful resources
Virtual Machine
isc/info/resources.1558114599.txt.gz ยท Last modified: 2019/05/17 20:36 by mihai.chiroiu
Old revisions
Media Manager
Back to top