SECURITY
ABOUT THE COURSE
Computer security is security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field includes all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance due to the increasing reliance of computer systems in most societies.It includes physical security to prevent theft of equipment and information security to protect the data on that equipment.
It is sometimes referred to as "cyber security" or "IT security". Those terms generally do not refer to physical security, but a common belief among computer security experts is that a physical security breach is one of the worst kinds of security breaches as it generally allows full access to both data and equipment.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity attempts to assure the protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest. Countermeasures can be put in place in order to increase the security of data. Some of these measures include, but are not limited to, access control, awareness training, audit and accountability, risk assessment, penetration testing, vulnerability management, and security assessment and authorization.
Key Features
Who Should Att end
| |
Module 01: | Basics |
Module 02: | Control Hijacking Attacks:Exploits and Defenses |
Module 03: | Dealing with Legency code:Sandboxing and Isolation |
Module 04: | tools for Writing Robust Application code |
Module 05: | Principle of Least Privilege,Access control,and Operating Systems Security |
Module 06: | Exploitation Techniques and Fuzzing |
Module 07: | Web Security |
Module 08: | Basic Web Security Model |
Module 09: | Web Application Security |
Module 10: | Content Security Policies(CSP),Web Workers,and Extensions |
Module 11: | Session Management and User Authentication |
Module 12: | Overview of Crytography |
Module 13: | HTTPS:Goals and Pitfalls |
Module 14: | Network Security |
Module 15: | Security Issues in Internet Protocols:TCP,DNS, and Routing |
Module 16: | Network Defense Tools:Firewalls,VPNs,Intrusion Detection, and Filters |
Module 17: | Unwanted Traffics:Denial of Service Attacks |
Module 18: | Security of Mobile Platforms |
Module 19: | Mobile Platforms Security Models:Android and iOS |
Module 20: | Mobile Threats and Malware |
Module 21: | More on Malware:Viruses,Spyware and Key-Loggers |