Marvins Underground Lectures
Welcome
Login / Register


Firewall Lectures


  • 1:16:27 Popular Information Security—Before&After Public-Key Cryptography

    Information Security—Before&After Public-Key Cryptography

    by Admin Added 122 Views / 0 Likes

    [Recorded Jan 26, 2005]Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, the world of information security was transformed by pub

  • 41:47 Introduction to Computer Security - Information Security Lesson #1 of 12

    Introduction to Computer Security - Information Security Lesson #1 of 12

    by Admin Added 60 Views / 0 Likes

    Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, types of attackers, methods of defense, and multi-l

  • 38:22 Identification and Authentication - Information Security Lesson #2 of 12

    Identification and Authentication - Information Security Lesson #2 of 12

    by Admin Added 50 Views / 0 Likes

    Dr. Soper discusses identification and authentication issues in the context of computer security. Topics covered include controlled access, impersonation, authentication failures, methods of attacking passwords (including dictionary attacks, brute-force a

  • 34:36 Software Program Security - Information Security Lesson #3 of 12

    Software Program Security - Information Security Lesson #3 of 12

    by Admin Added 37 Views / 0 Likes

    Dr. Soper discusses software program security. Topics covered include incomplete mediation, race conditions, time-of-check to time-of-use vulnerabilities, backdoors, intentional and unintentional program flaws, the "penetrate and patch" method, security i

  • 30:04 Malicious Code (Malware) - Information Security Lesson #4 of 12

    Malicious Code (Malware) - Information Security Lesson #4 of 12

    by Admin Added 41 Views / 0 Likes

    Dr. Soper discusses malware in the context of information security. Topics covered include viruses, worms, Trojan horses, zombies, logic bombs, rabbits, trapdoors, script attacks, attributes of malicious code, how viruses work, methods of hiding a virus,

  • 26:45 Illicit Data Interception and Access - Information Security Lesson #5 of 12

    Illicit Data Interception and Access - Information Security Lesson #5 of 12

    by Admin Added 56 Views / 0 Likes

    Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, keystroke loggers, physical attacks, social engineering, insider threats, computer forensics, a

  • 1:02:38 Encryption Concepts - Information Security Lesson #6 of 12

    Encryption Concepts - Information Security Lesson #6 of 12

    by Admin Added 47 Views / 0 Likes

    Dr. Soper discusses encryption concepts. Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted messages, substitution, transposition, and product ciphers, the Caesar cipher, the Vigenère cipher, o

  • 34:41 Firewalls and Network Security - Information Security Lesson #7 of 12

    Firewalls and Network Security - Information Security Lesson #7 of 12

    by Admin Added 45 Views / 0 Likes

    Dr. Soper discusses firewalls and network security. Topics covered include network vulnerabilities, port scanning, network segmentation, firewall security policies, the OSI reference model, packet filtering gateways, stateful inspection firewalls, applica

  • 29:57 Wireless Security - Information Security Lesson #8 of 12

    Wireless Security - Information Security Lesson #8 of 12

    by Admin Added 34 Views / 0 Likes

    Dr. Soper discusses security for wireless networks. Topics covered include wireless network concepts, wireless communication, the 802.11 protocol suite, wireless data frames, management frames, wireless network vulnerabilities, MAC spoofing, wired equival

  • 28:15 Data Interception and Public Key Encryption - Information Security Lesson #9 of 12

    Data Interception and Public Key Encryption - Information Security Lesson #9 of 12

    by Admin Added 34 Views / 0 Likes

    Dr. Soper discusses malicious data interception and public key encryption. Topics covered include wiretapping, defending against message interception, network encryption methods, the key exchange problem, public key encryption, RSA encryption, and key exc

  • 37:52 Forgeries and Digital Identities - Information Security Lesson #10 of 12

    Forgeries and Digital Identities - Information Security Lesson #10 of 12

    by Admin Added 49 Views / 0 Likes

    Dr. Soper discusses forgeries of digital artifacts and digital identities. Topics covered include forged email messages, phishing, spam, forged websites and software, online impersonation, cryptographic seals, online identities, digital signatures, using

  • 27:22 Denial of Service and Intrusion Detection - Information Security Lesson #11 of 12

    Denial of Service and Intrusion Detection - Information Security Lesson #11 of 12

    by Admin Added 53 Views / 0 Likes

    Dr. Soper discusses denial of service attacks and intrusion detection systems. Topics covered include types of denial of service (DoS) attacks, connection flooding, echo chargen attacks, ping of death attacks, smurf attacks, SYN flood attacks, teardrop at

  • 43:07 Information Privacy - Information Security Lesson #12 of 12

    Information Privacy - Information Security Lesson #12 of 12

    by Admin Added 45 Views / 0 Likes

    Dr. Soper discusses issues relating to information privacy. Topics covered include technology-related privacy concerns, fair information collection principles, privacy laws, information privacy and the government, multiple identities, identity theft, priv

Categories