University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

   
Lecture Videos Date
    Administration, Introduction        Jan 14 16, 2019
    Ethics and Law I        Jan 18, 2019
    Ethics and Law II        Jan 23, 2019
    Vulnerability/Risk Assessment I (this may be damaged - I do not think I can repair it)        Jan 25, 2019
    Threat Model and Vulnerability Classification        Jan 28, 2019
    Memory Corruption Vulnerabilities        Feb 4, 2019
    Return Oriented Programming        Feb 6, 2019
    Other Vulnerabilities        Feb 8, 2019
    Privilege Escalation/Separation        Feb 11, 2019
    Lab 2 and Containment (recorder stopped mid way)        Feb 13, 2019
    MILS (more recording problems)        Feb 15, 2019
    MILS, Audit (more recording problems)        Feb 15, 2019
    Language Design: integer overflow, underflow        Feb 18, 2019
    Language Design: type conversion        Feb 20, 2019
    Language Design: signals and Java        Feb 22, 2019
    Network Vulnerabilities: Malware (worms, trojans, etc.)        Feb 25, 2019
    Network Vulnerabilities: Cloud Security        Feb 27, 2019
    Network Vulnerabilities: Diffie-Hellman, Message Digest - prep for protocol vulnerabilities        Mar 1, 2019
    Network Protocols (partial)        Mar 4, 2019
    Lab 3 and Low-Layer Network Protocols        Mar 6, 2019
    Nop sled and shellcode + lab4        Mar 8, 2019
    Network attacks        Mar 11, 2019
    SSL/TLS attacks        Mar 13, 2019
    RC4 and compression attacks        Mar 15, 2019
    Side channel attacks: part 1        Mar 25, 2019
    Side channel attacks: part 2        Mar 27, 2019
    Side channel attacks: part 3        Mar 29, 2019
    Hardware vulnerabilities        Apr 1, 2019
    Android (no so good) security        Apr 3, 2019
    iOS or Android?        Apr 5, 2019
    Configuration Management - before the attack        Apr 10, 2019
    Configuration Management - after the attack        Apr 10, 2019
    Continuation of Configuration Management        Apr 12, 2019
    Social Engineering        Apr 17, 2019
    Watermarking        Apr 24, 2019

 2018
    Administration, Introduction        Jan 8, 2018
    Assessment        Jan 19, 2018
    Memory Corruption        Jan 24, 2018
    Privilege Escalation        Feb 2, 2018
    Privilege Separation        Feb 5, 2018
    Multiple Levels of Security        Feb 9, 2018
    Viruses        Feb 16, 2018
    Cloud Security, Homomorphic Encryption        Feb 23, 2018
    Authentication Protocol Vulnerabilities (sans projector)        Feb 26, 2018
    RSA, Diffie-Hellman, Needham-Schroeder, KDC        Feb 28, 2018
    Doug Flick on Lab 3, Ottway-Rees, Stateless Protocol Vulnerabilities        Mar 2, 2018
    IPSec description and vulnerabilities        Mar 6, 2018
    NTP description and vulnerabilities        Mar 7, 2018
    Low level network protocols        Mar 19, 2018
    Network attacks        Mar 21, 2018
    SSL attacks, Distance Vector Routing        Mar 23, 2018
    Intrusion Detection: Monitoring        Mar 26, 2018
    Intrusion Prevention        Mar 28, 2018
    Side Channel Vulnerabilities        Mar 30, 2018
    Hardware Vulnerabilities        Apr 2, 2018
    Side Channel Attacks        Apr 4, 2018
    Configuration Vulnerabilities and SCAP        Apr 6, 2018
    Steganography        Apr 9, 2018
    Watermarking, Reputation systems        Apr 11, 2018

ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson