Advanced Computer Security Program: Foundations For Information Security
Advanced Computer Security Program: Foundations For Information Security
Advanced Computer Security Program: Foundations For Information Security
Course 1:
Foundations for Information Security:
Motivation
- Introduction to Motivation
Security Goals
- Holistic Security
- Authentication
- Authorization
- Confidentiality and Data Integrity
- Accountability and Availability
- Non-Repudiation
Attacks
- Common Attacks Pt. 1
- Common Attacks Pt. 2
Attacker Life Cycle
- Introduction
- Explainer Video
- Life Cycle Pt 1,2,3
Mega Breaches
- Introduction
- 2018 - Aadhar, Exactis, Under Armour
- 2017 - Dun and Bradstreet, River City Media, WannaCry, Equifax
- 2016 - Yahoo
- 2013-14 - JPMorganChase, Target
- Defense in Depth
- Predicting Breaches
Security Design Principles
- Simple Web Server(SWS)
- Principle of Least Privilege
- Defense-in-Depth
- Securing the Weakest Link
- Fail-Safe Stance
- Secure by Default
- Simplicity and Usability
Secure System Design
- Threat Modeling
- Designing-In Security
- Convenience vs Security
- Secure SDLC Pt. 1,2
- Security by Obscurity
- Open vs Closed Source
- A Game of Economics
Client State Manipulation
- CSM Example Attacks Pt. 1,2
- POST vs GET
- Cookies
- Javascript
- Ajax
- Forceful Browsing
- Redirects
- File Upload Security
Command Injection
- Explainer Video
- CI Example Attacks Pt. 1,2
- Blacklisting
- Whitelisting
- Escaping
- Second-Order Attacks
- Prepared Statements and Bind Variables
- Impact Mitigation
- Other Command Injection
Buffer Overflows
- Anatomy of Buffer Overflow Attack Pt. 1,2
- Explainer Video
- Safe String Libraries
- StackGuard
Course 2:
Exploiting and Protecting Web Applications:
Course 3:
Using Cryptography Correctly:
Introduction to Cryptography
Symmetric Encryption
- Brief Overview
- Stream Ciphers
- Block Ciphers
- Using Block Ciphers
- Message Integrity
- Authenticated Encryption
Public Key Cryptography
- Concepts
- Digital Signatures
- Certificates
- Key Exchange: TLS
- Diffie Helman
Identification Protocols
- Authenticating against Users
- Security against Direct Attacks
- Security against Eavesdropping Attacks
- Security against Active Attacks
- Authentication Session - Industry Expert
Advance Primitives
- Brief Overview
- Protocols
- Privacy
- Broadcast Encryption
- Quantum Computing
Course 4:
Network Security
Internet Protocols
- Internet Infrastructure & Protocols
- Routing Security
- Domain Name System
Defenses & Tools
- Protecting Network Connections
- Standard Defenses for Local Networks
- Network Infrastructure Protocols
Denial of Service Attacks
- Handling Unwanted Traffic
- DOS Mitigation
Course 5:
Writing Secure Code:
Course 6:
Emerging Threats & Defences: