Security of Information Systems

Contents:

  • News
  • Resources
  • Grading
  • Sessions
    • Introduction to Systems Security
    • Authentication
    • Exploiting. Part 1: Applications
    • Exploiting. Part 2: Web & OS
    • Defense and Mitigation
    • Modern Offensive and Defensive Solutions
    • Application Confinement
    • System Isolation
    • Software Security Assurance
    • Fuzzing
    • Symbolic Execution
    • Software Supply Chain Security
    • System Auditing
  • Assignments
Security of Information Systems
  • Sessions
  • View page source

Sessions

Sessions for the Security of Information Systems class

  • Introduction to Systems Security
    • Tasks
  • Authentication
    • Tasks
    • Solutions
  • Exploiting. Part 1: Applications
    • Cheatsheet
    • Lab Key Takeaways
    • Tasks
  • Exploiting. Part 2: Web & OS
    • Tasks
  • Defense and Mitigation
    • Tasks
    • Solutions
  • Modern Offensive and Defensive Solutions
    • Tasks
  • Application Confinement
    • Tasks
  • System Isolation
    • Tasks
  • Software Security Assurance
    • Challenges
  • Fuzzing
    • Tasks
  • Symbolic Execution
    • Tasks
  • Software Supply Chain Security
    • Feedback
    • Tasks
  • System Auditing
    • Feedback
    • Tasks
Previous Next

© Copyright 2017, Computer Science and Engineering Departament, UPB.

Built with Sphinx using a theme provided by Read the Docs.