The computer system can be vulnerable to threats and issues. Ensuring that your computer system is protected is important to protect your data and files knowing the security features you can apply to your computer systems.
Learning how computer works and ways to protect it is the priority of this [course_title]. You are provided with knowledge of threat models, attacks, and techniques to achieve security for your computer operating system.
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: MIT
|Lecture 1: Introduction, Threat Models||01:17:00|
|Lecture 2: Control Hijacking Attacks||01:28:00|
|Lecture 3: Buffer Overflow Exploits and Defenses||01:22:00|
|Lecture 4: Privilege Separation||01:23:00|
|Lecture 6: Capabilities||01:23:00|
|Lecture 7: Sandboxing Native Code||01:23:00|
|Lecture 8: Web Security Model||01:23:00|
|Lecture 9: Securing Web Applications||01:22:00|
|Lecture 10: Symbolic Execution||01:22:00|
|Lecture 11: Ur/Web||01:20:00|
|Lecture 12: Network Security||01:19:00|
|Lecture 13: Network Protocols||01:21:00|
|Lecture 14: SSL and HTTPS||01:18:00|
|Lecture 15: Medical Software||01:15:00|
|Lecture 16: Side-Channel Attacks||01:22:00|
|Lecture 17: User Authentication||01:19:00|
|Lecture 18: Private Browsing||01:22:00|
|Lecture 19: Anonymous Communication||01:20:00|
|Lecture 20: Mobile Phone Security||01:22:00|
|Lecture 21: Data Tracking||01:20:00|
|Lecture 22: Guest Lecture by MIT IS&T||01:27:00|
|Lecture 23: Security Economics||01:17:00|
|Submit Your Assignment||00:00:00|
No Reviews found for this course.