Autumn 2019
Week | Topics | Lectures |
---|---|---|
34 | Software security Buffer overflows | Lecture 00 Lecture 01 |
35 | SQL injection Threat modelling | Lecture 02 Lecture 03 |
36 | Vulnerabilities Tools and resources | Lecture 04 Lecture 05 |
37 | Access control OS and application security | Lecture 06 Lecture 07 |
38 | Privilege separation Authentication | Lecture 08 Lecture 09 |
39 | Public-key encryption Web security: TLS and HTTPS | Lecture 10 |
40 | Cross site scripting Cross site request forgery | Lecture 11 Lecture 12 |
41 | Capability based Incorrect deserialisation | Lecture 13 Lecture 14 |
42 | Security through the software development cycle Language level security | Lecture 15 Lecture 16 |
43 | Programming best practices | Lecture 17 |
44 | Privacy | Lecture 18 Lecture 19 |
45 | Guest lecture: Stephen Mitchell Mobile security: Android | Lecture 20 |
Expecting a comment section? Feel free to e-mail me your comments, or otherwise contact me to discuss the content of this site. See my contact info. You can also write your opinion on your own website, and link back here! ☺