Cybersecurity Fundamentals: Attacks, Defenses, and Innovations
Master Cybersecurity: From Threats to Defenses - Unlock Knowledge with MIT OpenCourseWare's Comprehensive Series!
4.8 (63)
456 learners
What you'll learn
Understand threat models and control hijacking attacks
Implement defenses against buffer overflow exploits
Learn techniques for securing web applications and protocols
Explore mobile phone security and data tracking methods
Implement defenses against buffer overflow exploits
Learn techniques for securing web applications and protocols
Explore mobile phone security and data tracking methods
This course includes
- 29.7 hours of video
- Certificate of completion
- Access on mobile and TV
Course content
1 modules • 22 lessons • 29.7 hours of video
Advanced Security Practices and Threat Mitigation
22 lessons • 29.7 hours
▶
Advanced Security Practices and Threat Mitigation
22 lessons • 29.7 hours
- 1. Introduction, Threat Models01:17:12
- 2. Control Hijacking Attacks01:27:38
- 3. Buffer Overflow Exploits and Defenses01:21:37
- 4. Privilege Separation01:23:29
- 6. Capabilities01:21:57
- 7. Sandboxing Native Code01:23:21
- 8. Web Security Model01:22:48
- 9. Securing Web Applications01:22:08
- 10. Symbolic Execution01:22:16
- 11. Ur/Web01:20:04
- 12. Network Security01:18:26
- 13. Network Protocols01:21:03
- 14. SSL and HTTPS01:18:17
- 15. Medical Software01:15:31
- 16. Side-Channel Attacks01:22:15
- 17. User Authentication01:19:48
- 18. Private Browsing01:20:13
- 19. Anonymous Communication01:20:13
- 20. Mobile Phone Security01:22:00
- 21. Data Tracking01:19:38
- 22. Guest Lecture by MIT IS&T01:26:51
- 23. Security Economics01:17:24