Category Archive: Academic Lectures

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/

Security Protocols (Advanced Topics in Cryptology)

This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them. Course Outline Basics in cryptology – cryptosystems, digital signatures, (keyed) …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/10/security-protocols-advanced-topics-cryptology/

CS 276, Spring 2006 Cryptography

  http://www.cs.berkeley.edu/~daw/teaching/cs276-s06/

Permanent link to this article: http://www.darknessgate.com/2014/09/10/cs-276-spring-2006-cryptography/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Course F21CN: Computer Network Security

The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/

CNIT 121: Computer Forensics

The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/

Cryptography and Computer Security (CCS)

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. Course goal is introduction to algorithms and fundamentals of security protocols and technics. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/06/cryptography-computer-security-ccs/

6.857: Computer and Network Security

6.857: Computer and Network Security by Massachusetts Institute of Technology http://courses.csail.mit.edu/6.857/2014/handouts

Permanent link to this article: http://www.darknessgate.com/2014/09/05/6-857-computer-network-security/

Security and Cryptography (CSS 322)

This course aims to introduce you to the principles and techniques of securing computers and computer networks, with focus on Internet security. The course is effectively split into two parts: first introducing the theory of cryptography, including how many classical and popular algorithms work (e.g. DES, RSA, digital signatures); and second providing details of real …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/04/security-cryptography-css-322/

CSE571S: Network Security (Fall 2011)

A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/04/cse571s-network-security-fall-2011/

Introduction to Computer Security, Spring 2014

Course Objectives: Ever since the first worm, Morris Worm, released through the Internet in 1988, the attack-defense game between hackers and administrators never ends. To better protect our ICT (Information and Communications Technology) systems, we need to understand first what hacking techniques have been developed over the years and then see their countermeasures. This course …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/03/introduction-computer-security-spring-2014/

Page 3 of 1012345...Last »