Tag: Course Lectuers

Cyber Security: Safety at Home, Online, in Life

The course will introduce you to some of the current key topics in cyber security research and show how they relate to everyday life. We’ll look at how the move to online storage of personal data affects privacy, how online payments can be made safely, and how the proliferation of “smart” devices affect security. Over …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/19/cyber-security-safety-at-home-online-in-life/

What is cryptography?

What is Cryptography? A story which takes us from Caesar to Claude Shannon. Created by Brit Cruise.   https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography  

Permanent link to this article: http://www.darknessgate.com/2016/10/18/what-is-cryptography/

Cyber Criminals Want Your Information: Stop Them Cold! | Udemy free course

Course Description Let’s face it – life on the Internet means usernames and passwords (accounts)! Lots of them in fact! Stop and think about it for a moment. How many sites do you login into daily, weekly, or monthly? Social media: Facebook, Twitter, Snapchat, Skype, Pinterest, Instragram, Youtube… Ecommerce: Amazon, eBay, Overstock, Newegg, Target, Walmart… …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/14/cyber-criminals-want-your-information-stop-them-cold-udemy-free-course/

Free Cyber Security training | cybrary.it

Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience. http://www.cybrary.it  

Permanent link to this article: http://www.darknessgate.com/2016/10/11/free-cyber-security-training-cybrary-it/

Computer Science 530 – Syllabus and Reading List — Fall 2016

University of Southern California Information Sciences Institute http://ccss.usc.edu/530/fall16/16-sylrl.html

Permanent link to this article: http://www.darknessgate.com/2016/09/28/computer-science-530-syllabus-and-reading-list-fall-2016/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Spring 2014 Lectures & Videos – Offensives computer security course

This page contains all the lecture Lecture Slides and youtube videos for the Spring 2014 semester of this course. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

Permanent link to this article: http://www.darknessgate.com/2014/11/02/spring-2014-lectures-videos-offensives-computer-security-course/

Network and Computer Security

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/17/network-computer-security/

Introduction to computer forensics and investigations

Learning outcomes an understanding of the role of computer forensics in both the business and private world identify some of the current techniques and tools for forensic examinations describe and identify basic principles of good professional practice for a forensic computing practitioner become familiar with some forensic tools and know how to apply them in …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/13/introduction-computer-forensics-investigations/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: http://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/

Cryptography

This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/30/cryptography/