Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Computer Systems Security (M-I-T)

(22 Lectures Available)

S# Lecture Course Institute Instructor Discipline
1
  • 1. Introduction, Threat Models (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
2
  • 10. Symbolic Execution (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
3
  • 11. Ur/Web (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
4
  • 12. Network Security (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
5
  • 13. Network Protocols (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
6
  • 14. SSL and HTTPS (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
7
  • 15. Medical Software (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
8
  • 16. Side-Channel Attacks (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
9
  • 17. User Authentication (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
10
  • 18. Private Browsing (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
11
  • 19. Anonymous Communication (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
12
  • 2. Control Hijacking Attacks (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
13
  • 20. Mobile Phone Security (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
14
  • 21. Data Tracking (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
15
  • 22. Guest Lecture by MIT IS&T (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
16
  • 23. Security Economics (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
17
  • 3. Buffer Overflow Exploits and Defenses (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
18
  • 4. Privilege Separation (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
19
  • 6. Capabilities (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
20
  • 7. Sandboxing Native Code (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
21
  • 8. Web Security Model (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
22
  • 9. Securing Web Applications (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences