MIT 6.858 Computer Systems Security, Fall 2014
Master Cybersecurity: From Threats to Defenses - Unlock Knowledge with MIT OpenCourseWare's Comprehensive Series!
5.0
(5)
45 learners
What you'll learn
- Understand threat models and control hijacking attacks
- Implement defenses against buffer overflow exploits
- Learn techniques for securing web applications and protocols
- Explore mobile phone security and data tracking methods
This course includes
- 29.5 hours of video
- Certificate of completion
- Access on mobile and TV
Course content
1 modules • 22 lessons • 29.5 hours of video
Advanced Security Practices and Threat Mitigation
22 lessons
• 29.5 hours
Advanced Security Practices and Threat Mitigation
22 lessons
• 29.5 hours
- 1. Introduction, Threat Models 01:17:13
- 2. Control Hijacking Attacks 01:27:39
- 3. Buffer Overflow Exploits and Defenses 01:21:38
- 4. Privilege Separation 01:23:29
- 6. Capabilities 01:21:57
- 7. Sandboxing Native Code 01:23:21
- 8. Web Security Model 01:22:49
- 9. Securing Web Applications 01:22:08
- 10. Symbolic Execution 01:22:16
- 11. Ur/Web 01:20:04
- 12. Network Security 01:18:26
- 13. Network Protocols 01:21:03
- 14. SSL and HTTPS 01:18:18
- 15. Medical Software 01:15:31
- 16. Side-Channel Attacks 01:22:16
- 17. User Authentication 01:19:48
- 18. Private Browsing 01:20:13
- 19. Anonymous Communication 01:20:13
- 20. Mobile Phone Security 01:22:00
- 21. Data Tracking 01:19:38
- 22. Guest Lecture by MIT IS&T 01:26:51
- 23. Security Economics 01:17:25
