Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Internet security
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (28)
Login to filter by course
Login to filter by course
Reset
5G Authentication: Security and SUKI
Explores the evolution of 5G authentication, vulnerabilities in 4G, and improvements in 5G security.
Protecting Work and EPFL
Emphasizes the importance of protecting work and EPFL through security measures and prevention strategies for safe web surfing.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.
Zero Days Vulnerability: Security Breaches on Personal Devices
Explores zero days vulnerability, ethical hacking, cyber attacks, and defense strategies against cyber threats.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Network Security: BGP Spoofing
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Nano-Tera: Engineering the Future
Covers engineering multi-scale systems for health, security, energy, and the environment, focusing on taking innovation from labs to daily life.
Previous
Page 2 of 2
Next