E.g., Saturday, November 1, 2014
E.g., Saturday, November 1, 2014
E.g., Saturday, November 1, 2014
Self Paced Course - Start anytime

Technology use among children and adolescents is growing at an astronomical rate. Think about how many parents purchase their children smartphones, gaming systems, iPads, or other digital devices. With access to the Internet, these devices allow children to connect to others in ways we never could have imagined. With the proliferation of these devices comes concerns about cyberbullying, screentime, digital citizenship, media literacy, and exposure to inappropriate content. For parents, keeping up with their children's use of technology can be a daunting challenge.
So what can parents do to help kids use these devices responsibly? When online, how can parents make sure their children are safe? What can parents do prevent the sharing of personally identifiable information? These are just a few of the questions this course will attempt to explore.

0
No votes yet
Self Paced Course - Start anytime

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Self Paced Course - Start anytime

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

0
No votes yet
Self Paced Course - Start anytime

This course is the student foundation-level computer & network security skills & knowledge.

6
Average: 6 (1 vote)
Self Paced Course - Start anytime

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

0
No votes yet
Self Paced Course - Start anytime

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

0
No votes yet
Self Paced Course - Start anytime

An introduction to Trusted Computing concepts, and a detailed look at what the Trusted Platform Module (TPM) can (and can't) do.

0
No votes yet
Self Paced Course - Start anytime

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

0
No votes yet
Self Paced Course - Start anytime

A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.

0
No votes yet
Self Paced Course - Start anytime

Intel processors have been a major force in personal computing for more than 30 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation.

0
No votes yet
Self Paced Course - Start anytime

This class provides an introduction to the ARM architecture and assembly language.

0
No votes yet
Self Paced Course - Start anytime

A survey of basic stack and heap-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code.

0
No votes yet
Self Paced Course - Start anytime

A very detailed dive into how binary executable formats work. In particular the PE format used by Windows.

0
No votes yet
Jan 5th 2015

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)
Sep 15th 2014

从操作系统与虚拟化平台面临的安全问题和应该采取的安全机制入手,帮助你学习和掌握计算机系统安全的基本理论、技术、方法和评测标准。Learn about operating systems, virtualization security issues, and related security theories, technologies, methods and evaluation criteria, as well as gain a deeper understanding of computer systems security.

0
No votes yet
Feb 17th 2014

El curso pretende alcanzar los siguientes objetivos:
- Realizar una aproximación general al concepto, la historia y los tipos de redes sociales que existen.
- Aproximación jurídica al concepto de red social y las complejidades que la normativa actual plantea ante los retos de los usuarios en las redes sociales.
- Familiarizar al usuario acerca del concepto de privacidad y como manejar la misma en las principales redes sociales.
- Familiarizar al usuario con el concepto de propiedad intelectual, así como con los márgenes y límites a su ejercicio.

0
No votes yet
Nov 10th 2014

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

0
No votes yet
Nov 3rd 2014

This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.

10
Average: 10 (4 votes)

Pages

 

Tell your friends: