• LOGIN
  • No products in the cart.

The computer system can be vulnerable to threats and issues. Ensuring that your computer system is protected is important to protect your data and files knowing the security features you can apply to your computer systems.

Learning how computer works and ways to protect it is the priority of this [course_title]. You are provided with knowledge of threat models, attacks, and techniques to achieve security for your computer operating system.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: MIT

Course Curriculum

Module: 01
Lecture 1: Introduction, Threat Models 01:17:00
Lecture 2: Control Hijacking Attacks 01:28:00
Lecture 3: Buffer Overflow Exploits and Defenses 01:22:00
Lecture 4: Privilege Separation 01:23:00
Module: 02
Lecture 6: Capabilities 01:23:00
Lecture 7: Sandboxing Native Code 01:23:00
Lecture 8: Web Security Model 01:23:00
Lecture 9: Securing Web Applications 01:22:00
Lecture 10: Symbolic Execution 01:22:00
Module: 03
Lecture 11: Ur/Web 01:20:00
Lecture 12: Network Security 01:19:00
Lecture 13: Network Protocols 01:21:00
Lecture 14: SSL and HTTPS 01:18:00
Lecture 15: Medical Software 01:15:00
Module: 04
Lecture 16: Side-Channel Attacks 01:22:00
Lecture 17: User Authentication 01:19:00
Lecture 18: Private Browsing 01:22:00
Lecture 19: Anonymous Communication 01:20:00
Lecture 20: Mobile Phone Security 01:22:00
Module: 05
Lecture 21: Data Tracking 01:20:00
Lecture 22: Guest Lecture by MIT IS&T 01:27:00
Lecture 23: Security Economics 01:17:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.6

4.6
7 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

351 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841