Login to filter by course Login to filter by course Reset
Malware: BotnetsExplores botnets, networks of compromised hosts controlled by a single entity, and defense strategies against them, highlighting the impact of malicious software.
Malware: IntroductionIntroduces the basics of malware, its distribution, reasons for its rise, and taxonomy.
Malware: Types of malwareExplores various types of malware, defenses against them, and real-world examples like Stuxnet worm targeting Iran's nuclear power plants.
IT security basicsCovers the fundamentals of IT security, including complex passwords and malware prevention.
Cybersecurity: Vulnerabilities and ExploitsExplores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Email Security: Best PracticesDelves into email security statistics, filtering techniques, Cisco Email Security Appliance, authentication, web application access control, vulnerabilities, and antivirus infrastructure migration.
Safe Surfing IIEmphasizes the importance of safe web browsing practices and how to avoid online threats.
Graph Machine LearningDelves into graph-enhanced machine learning, focusing on fraud detection, malware detection, and recommendation systems.
Cybersecurity for NewspaceExplores cybersecurity challenges in Newspace, emphasizing encryption, payment demands, and top recommendations for secure satellite design.