Advanced System Security and Digital Forensics
Ultimate Information Security Course
19 Videos

Lecture 2 | Cyber Attacks | Advanced System Security and Digital Forensics | Sridhar Iyer | ASSDF
58:30
Lecture 3 | Threats and Vulnerabilities| Advanced System Security & Digital Forensics| Sridhar Iyer
43:08
Lecture 4 | Authentication Methodologies |Advanced System Security & Digital Forensics| Sridhar Iyer
55:01
Lecture 5 | Authentication, Access Control|Advanced System Security & Digital Forensics|Sridhar Iyer
1:03:06
Lecture 6 | Kerberos and Access Control | Advanced System Security & Digital Forensics| Sridhar Iyer
54:05
Lecture 9 and 10 | Targeted Malicious Code |Salami Attack|Linearization Attack| ASSDF | Sridhar Iyer
53:01
Lecture 11 | Operating System Security | Fence | Relocation | Paging | Segmentation | Sridhar Iyer
55:16
Lecture 14 | OWASP Top 10 | Web Security Considerations | Part 1| Web Cookies | ASSDF | Sridhar Iyer
1:00:20
Lecture 15 | OWASP Top 10 | Web Security Considerations | Part 2| Web Cookies | ASSDF | Sridhar Iyer
58:26