Welcome to the Security of Information Systems class!¶
- News
- Resources
- Grading
- Sessions
- Introduction to Systems Security
- Authentication
- Exploiting. Part 1: Applications
- Exploiting. Part 2: Web & OS
- Defense and Mitigation
- Modern Offensive and Defensive Solutions
- Application Confinement
- System Isolation
- Software Security Assurance
- Fuzzing. Symbolic Execution
- Symbolic Execution
- Software Supply Chain Security
- System Auditing
- Assignments