Course Hive

Cybersecurity Fundamentals: Attacks, Defenses, and Innovations

Master Cybersecurity: From Threats to Defenses - Unlock Knowledge with MIT OpenCourseWare's Comprehensive Series!

4.8 (63)
456 learners

What you'll learn

Understand threat models and control hijacking attacks
Implement defenses against buffer overflow exploits
Learn techniques for securing web applications and protocols
Explore mobile phone security and data tracking methods

This course includes

  • 29.7 hours of video
  • Certificate of completion
  • Access on mobile and TV

Course content

1 modules • 22 lessons • 29.7 hours of video

Advanced Security Practices and Threat Mitigation
22 lessons • 29.7 hours
  • 1. Introduction, Threat Models01:17:12
  • 2. Control Hijacking Attacks01:27:38
  • 3. Buffer Overflow Exploits and Defenses01:21:37
  • 4. Privilege Separation01:23:29
  • 6. Capabilities01:21:57
  • 7. Sandboxing Native Code01:23:21
  • 8. Web Security Model01:22:48
  • 9. Securing Web Applications01:22:08
  • 10. Symbolic Execution01:22:16
  • 11. Ur/Web01:20:04
  • 12. Network Security01:18:26
  • 13. Network Protocols01:21:03
  • 14. SSL and HTTPS01:18:17
  • 15. Medical Software01:15:31
  • 16. Side-Channel Attacks01:22:15
  • 17. User Authentication01:19:48
  • 18. Private Browsing01:20:13
  • 19. Anonymous Communication01:20:13
  • 20. Mobile Phone Security01:22:00
  • 21. Data Tracking01:19:38
  • 22. Guest Lecture by MIT IS&T01:26:51
  • 23. Security Economics01:17:24

Suggest a Youtube Course

Our catalog is built based on the recommendations and interests of students like you.

FAQs