Computer and Network Security

 Click to Download Power Point Lectures
Lecture 1
Course overview   [pdfppt]
Part 1: Basics
Lecture 2
Control hijacking attacks: exploits and defenses   [pdfppt]
Lecture 3
Exploitation techniques and fuzzing   [pdfppt]
Lecture 4
Secure system design, access control, and protection   [pdfppt]
Lecture 5
Tools for writing robust application code   [pdf]
Lecture 6
Use of cryptography in computer security   [pdfppt]
Lecture 7
Dealing with bad (legacy) application code: sandboxing and isolation   [pdfppt]
Part 2: Web Security
Lecture 8
Basic web security model   [pdfppt]
Lecture 9
User authentication and session management   [pdfppt]
Web application security   [pdfppt]
HTTPS: goals and pitfalls   [pdfppt]
Part 3: Network security
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Unwanted traffic: denial of service attacks   [pdfppt]
Network security testing   [pdfppt]
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
bot-nets: attacks and defenses   [pdfppt]
Part 4: Final topic
The Trusted Computing Architecture   [pdfppt]


Ultra-low latency MAC said...

It is extremely interesting for me to read the article. Thank you for it. I like such topics and everything connected to them. I would like to read a bit more on that blog soon.
NIC with Full TCP Offload.
Thanks for sharing..

Qadit System said...

This post is really nice and informative. The explanation given is really comprehensive and informative. I am feeling happy to comment on this post.

Thanks & Regards

System and network security in Hyderabad