CURSO DE SEGURANÇA EM SISTEMAS INFORMÁTICOS – MIT

O  MIT (Massachusetts Institute of Technology) esta oferecendo cursos onlines, e um deles e de sec, veja abaixo

6.858 Fall 2014 Lecture 1: Introduction
6.858 Fall 2014 Lecture 2: Control hijacking attacks
6.858 Fall 2014 Lecture 3: Buffer overflow exploits and defenses
6.858 Fall 2014 Lecture 4: Privilege separation
6.858 Fall 2014 Lecture 5: Guest lecture by Paul Youn from iSEC Partners
6.858 Fall 2014 Lecture 6: Capabilities
6.858 Fall 2014 Lecture 7: Native Client
6.858 Fall 2014 Lecture 8: Web security
6.858 Fall 2014 Lecture 9: Securing web applications
6.858 Fall 2014 Lecture 10: Symbolic execution
6.858 Fall 2014 Lecture 11: Ur/Web
6.858 Fall 2014 Lecture 12: Network security
6.858 Fall 2014 Lecture 13: Kerberos
6.858 Fall 2014 Lecture 14: HTTPS
6.858 Fall 2014 Lecture 15: Medical software
6.858 Fall 2014 Lecture 16: Side-channel attacks
6.858 Fall 2014 Lecture 17: User authentication
6.858 Fall 2014 Lecture 18: Private browsing
6.858 Fall 2014 Lecture 19: Tor
6.858 Fall 2014 Lecture 21: Data tracking
6.858 Fall 2014 Lecture 22: Guest lecture by Mark Silis and David LaPorte from MIT IS&T
6.858 Fall 2014 Lecture 23: Security economics
6.858 Fall 2014 Lecture 24: Final project presentations
6.858 Fall 2014 Lecture 20: Mobile phone security

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s