University of Cincinnati Logo
 

20-CS-5156 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

   
Lecture Videos Date

 2018
    Administration, Introduction        Jan 8, 2018
    Assessment        Jan 19, 2018
    Memory Corruption        Jan 24, 2018
    Privilege Escalation        Feb 2, 2018
    Privilege Separation        Feb 5, 2018
    Multiple Levels of Security        Feb 9, 2018
    Viruses        Feb 16, 2018
    Cloud Security, Homomorphic Encryption        Feb 23, 2018
    Authentication Protocol Vulnerabilities (sans projector)        Feb 26, 2018
    RSA, Diffie-Hellman, Needham-Schroeder, KDC        Feb 28, 2018
    Doug Flick on Lab 3, Ottway-Rees, Stateless Protocol Vulnerabilities        Mar 2, 2018
    IPSec description and vulnerabilities        Mar 6, 2018
    NTP description and vulnerabilities        Mar 7, 2018
    Low level network protocols        Mar 19, 2018
    Network attacks        Mar 21, 2018
    SSL attacks, Distance Vector Routing        Mar 23, 2018
    Intrusion Detection: Monitoring        Mar 26, 2018
    Intrusion Prevention        Mar 28, 2018
    Side Channel Vulnerabilities        Mar 30, 2018
    Hardware Vulnerabilities        Apr 2, 2018
    Side Channel Attacks        Apr 4, 2018
    Configuration Vulnerabilities and SCAP        Apr 6, 2018
    Steganography        Apr 9, 2018
    Watermarking, Reputation systems        Apr 11, 2018

 2017
    Administration, Introduction, Disclosure: Ethics & Legal Issues        Jan 11, 2017
    DRM, Assessment        Jan 18, 2017
    Vulnerability Classification, Stack Overflow        Jan 23, 2017
    Vulnerabilites        Jan 25, 2017
    Return to libc        Jan 30, 2017
    Language design issues        Feb 1, 2017
    More language design issues        Feb 6, 2017
    Privilege escalation        Feb 8, 2017
    MILS, Audits        Feb 15, 2017
    Cloud security        Feb 20, 2017
    Worms (Viruses and Trojans too)        Feb 22, 2017
    Network Protocols and Vulnerabilities I        Feb 27, 2017
    Network Protocols and Vulnerabilities II        Mar 1, 2017
    SSL Attacks        Mar 6, 2017
    Other Network Attacks        Mar 8, 2017
    Lab 6 plus...        Mar 20, 2017
    Hardware Vulnerabilities I        Mar 28, 2017
    Hardware Vulnerabilities II        Apr 3, 2017
    Configuration Management        Apr 5, 2017
    Watermarking, Steganography, Reputation Systems, eCommerce Fraud        Apr 17, 2017
    Social Engineering        Apr 19, 2017

ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson