Starting a new Lecture Notes Series on MIT 6.858 Computer Systems Security, Fall 2014
.png)
.png)
Youtube Lecture Playlist CreditsChannel Name: MIT OpenCourseWare
So Let Us Start to This Journey of Learning
MIT 6.858 Computer Systems Security, Fall 2014 By Lecture Notes together!
Lecture 1: 1. Introduction, Threat Models
Lecture 2: 2. Control Hijacking Attacks
Lecture 3: 3. Buffer Overflow Exploits and Defenses
Lecture 4: 4. Privilege Separation
Lecture 5: 6. Capabilities
Lecture 6: 7. Sandboxing Native Code
Lecture 7: 8. Web Security Model
Lecture 8: 9. Securing Web Applications
Lecture 9: 10. Symbolic Execution
Lecture 10: 11. Ur/Web
Lecture 11: 12. Network Security
Lecture 12: 13. Network Protocols
Lecture 13: 14. SSL and HTTPS
Lecture 14: 15. Medical Software
Lecture 15: 16. Side-Channel Attacks
Lecture 16: 17. User Authentication
Lecture 17: 18. Private Browsing
Lecture 18: 19. Anonymous Communication
Lecture 19: 20. Mobile Phone Security
Lecture 20: 21. Data Tracking
Lecture 21: 22. Guest Lecture by MIT IS&T
Lecture 22: 23. Security Economics