Computer and Network Security

 Click to Download Power Point Lectures
Lecture 1
Course overview   [pdfppt]
Part 1: Basics
Lecture 2
Control hijacking attacks: exploits and defenses   [pdfppt]
Lecture 3
Exploitation techniques and fuzzing   [pdfppt]
Lecture 4
Secure system design, access control, and protection   [pdfppt]
Lecture 5
Tools for writing robust application code   [pdf]
Lecture 6
Use of cryptography in computer security   [pdfppt]
Lecture 7
Dealing with bad (legacy) application code: sandboxing and isolation   [pdfppt]
Part 2: Web Security
Lecture 8
Basic web security model   [pdfppt]
Lecture 9
User authentication and session management   [pdfppt]
Lecture10
Web application security   [pdfppt]
Lecture11
HTTPS: goals and pitfalls   [pdfppt]
Part 3: Network security
Lecture12
Security problems in network protocols: TCP, DNS, SMTP, and routing   [pdfppt]
Lecture13
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters   [pdfppt]
Lecture14
Unwanted traffic: denial of service attacks   [pdfppt]
Lecture15
Network security testing   [pdfppt]
Lecture16
Malware: Computer viruses, Spyware, and key-loggers   [pdfppt]
Lecture17
bot-nets: attacks and defenses   [pdfppt]
Part 4: Final topic
Lecture18
The Trusted Computing Architecture   [pdfppt]

2 comments:

Ultra-low latency MAC said...

It is extremely interesting for me to read the article. Thank you for it. I like such topics and everything connected to them. I would like to read a bit more on that blog soon.
NIC with Full TCP Offload.
Thanks for sharing..

Qadit System said...

This post is really nice and informative. The explanation given is really comprehensive and informative. I am feeling happy to comment on this post.

Thanks & Regards

System and network security in Hyderabad