Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Computer Systems Security
Computer Systems Security
Lecture 1 - Introudction
Lecture 2: Control Hijacking Attacks (87:38)
Lecture 3: Buffer Overflow Exploits and Defenses (81:37)
Lecture 4: Privilege Separation (83:28)
Lecture 6: Capabilities (81:56)
Lecture 7: Sandboxing Native Code (83:20)
Lecture 8: Web Security Model (82:48)
Lecture 9: Securing Web Applications (82:07)
Lecture 10: Symbolic Execution
Lecture 11: Ur/Web (80:03)
Lecture 12: Network Security (78:25)
Lecture 13: Network Protocols
Lecture 14: SSL and HTTPS (78:17)
Lecture 15: Medical Software (75:30)
Lecture 16: Side-Channel Attacks (82:15)
Lecture 17: User Authentication (79:47)
Lecture 18: Private Browsing (80:12)
Lecture 19: Anonymous Communication (80:12)
Lecture 20: Mobile Phone Security (81:59)
Lecture 21: Data Tracking (79:37)
Lecture 22: Guest Lecture by MIT IS&T
Lecture 23: Security Economics (77:24)
Labs
Lab 1: Buffer Overflows (PDF)
Lab 2: Privilege Separation (PDF)
Lab 3: Symbolic Execution (PDF)
Lab 5: Browser Security (PDF)
Lab 6: JavaScript Sandboxing (PDF)
Teach online with
Lecture 2: Control Hijacking Attacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock