E.g., Friday, November 28, 2014
E.g., Friday, November 28, 2014
E.g., Friday, November 28, 2014
Self Paced Course - Start anytime

Technology use among children and adolescents is growing at an astronomical rate. Think about how many parents purchase their children smartphones, gaming systems, iPads, or other digital devices. With access to the Internet, these devices allow children to connect to others in ways we never could have imagined. With the proliferation of these devices comes concerns about cyberbullying, screentime, digital citizenship, media literacy, and exposure to inappropriate content. For parents, keeping up with their children's use of technology can be a daunting challenge.
So what can parents do to help kids use these devices responsibly? When online, how can parents make sure their children are safe? What can parents do prevent the sharing of personally identifiable information? These are just a few of the questions this course will attempt to explore.

0
No votes yet
Self Paced Course - Start anytime

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Self Paced Course - Start anytime

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

0
No votes yet
Self Paced Course - Start anytime

This course is the student foundation-level computer & network security skills & knowledge.

6
Average: 6 (1 vote)
Self Paced Course - Start anytime

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

0
No votes yet
Self Paced Course - Start anytime

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

0
No votes yet
Self Paced Course - Start anytime

An introduction to Trusted Computing concepts, and a detailed look at what the Trusted Platform Module (TPM) can (and can't) do.

0
No votes yet
Self Paced Course - Start anytime

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

0
No votes yet
Self Paced Course - Start anytime

Intel processors have been a major force in personal computing for more than 30 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation.

0
No votes yet
Self Paced Course - Start anytime

This class provides an introduction to the ARM architecture and assembly language.

0
No votes yet
Self Paced Course - Start anytime

A survey of basic stack and heap-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code.

0
No votes yet
Self Paced Course - Start anytime

A very detailed dive into how binary executable formats work. In particular the PE format used by Windows.

0
No votes yet
Self Paced Course - Start anytime

A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.

0
No votes yet
Jan 26th 2015

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.

0
No votes yet
Jan 5th 2015

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)
Jan 19th 2015

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

0
No votes yet
Jan 5th 2015

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

0
No votes yet
Sep 15th 2014

从操作系统与虚拟化平台面临的安全问题和应该采取的安全机制入手,帮助你学习和掌握计算机系统安全的基本理论、技术、方法和评测标准。Learn about operating systems, virtualization security issues, and related security theories, technologies, methods and evaluation criteria, as well as gain a deeper understanding of computer systems security.

0
No votes yet

Pages

 

Tell your friends: