| 1 |
Lecture 1 -Introduction to Computer Security
|
|
|
2022-02-25
|
|
|
| 2 |
Lecture 2 -Principles of Computer Security
|
|
|
2022-02-25
|
|
|
| 3 |
Lecture 3 -Application & Network Attacks
|
|
|
2022-02-25
|
|
|
| 4 |
Lecture 4 -Vulnerability Assessment & Mitigating Attacks
|
|
|
2022-02-25
|
|
|
| 5 |
Lecture 5 -Security Policies & Standards I
|
|
|
2022-02-25
|
|
|
| 6 |
Lecture 6 -Security Policies & Standards II
|
|
|
2022-02-25
|
|
|
| 7 |
Lecture 7 -Cryptography: Symmetric & Asymmetric Ciphers
|
|
|
2022-02-25
|
|
|
| 8 |
Lecture 8 -Cryptography: Data Integrity Algorithms
|
|
|
2022-02-25
|
|
|
| 9 |
Lecture 9 -Network & Internet Security
|
|
|
2022-02-25
|
|
|
| 10 |
Lecture 10 -Forensics
|
|
|
2022-02-25
|
|
|
| 11 |
Lecture 11 -Intrusion Detection Systems
|
|
|
2022-02-25
|
|
|
| 12 |
Lecture 12 -Intrusion Prevention Systems
|
|
|
2022-02-25
|
|
|
| 13 |
Exam
|
|
|
2022-02-25
|
| 14 |
Assignment
|
|
|
2022-02-25
|