Computer and Network Security

 Click to Download Power Point Lectures
Lecture 1
Course overview   [pdfppt]
Part 1: Basics
Lecture 2
Control hijacking attacks: exploits and defenses   [pdfppt]
Lecture 3
Exploitation techniques and fuzzing   [pdfppt]
Lecture 4
Secure system design, access control, and protection   [pdfppt]
Lecture 5
Tools for writing robust application code   [pdf]
Lecture 6
Use of cryptography in computer security   [pdfppt]
Lecture 7
Dealing with bad (legacy) application code: sandboxing and isolation   [pdfppt]
Part 2: Web Security
Lecture 8
Basic web security model   [pdfppt]
Lecture 9
User authentication and session management   [pdfppt]
Lecture10
Web application security   [pdfppt]
Lecture11
HTTPS: goals and pitfalls   [pdfppt]
Part 3: Network security
Lecture12
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Lecture13
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Lecture14
Unwanted traffic: denial of service attacks   [pdfppt]
Lecture15
Network security testing   [pdfppt]
Lecture16
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
Lecture17
bot-nets: attacks and defenses   [pdfppt]
Part 4: Final topic
Lecture18
The Trusted Computing Architecture   [pdfppt]

1 comment:

Ultra-low latency MAC said...

It is extremely interesting for me to read the article. Thank you for it. I like such topics and everything connected to them. I would like to read a bit more on that blog soon.
NIC with Full TCP Offload.
Thanks for sharing..