Books & Videos

Table of Contents

Chapter: Security Engineering - Introduction

Introduction

05m 45s

Chapter: Security Models

Introduction To Security Models

07m 12s

Bell-Lapadula

09m 21s

Biba

10m 11s

Applying The Models

08m 19s

Clark-Wilson

06m 47s

Clark-Wilson Brewer-Nash

04m 56s

TCB

09m 44s

TCSEC

07m 33s

ITSEC

04m 5s

Common Criteria

05m 38s

Chapter: Computer Hardware Architecture

Overview

06m 57s

CPU

07m 4s

Motherboard

05m 29s

Memory

07m 5s

Virtual Memory

10m 0s

Memory

07m 51s

TPM

09m 31s

Chapter: Operating System Architecture

Overview

09m 13s

Four Ring Architecture

06m 4s

Kernel Mode

07m 16s

Features

06m 29s

Processes Threads And Buffers

09m 4s

Process And Memory Management

08m 59s

Reference Monitor

06m 20s

System Self Protection

06m 51s

Hardened Server

07m 56s

Chapter: Virtualization

Virtualization Overview - Part 1

08m 56s

Virtualization Overview - Part 2

08m 28s

Chapter: Information Systems And Application Architecture

Architecture - Part 1

06m 30s

Architecture - Part 2

04m 51s

Architecture - Part 3

07m 23s

Cloud Computing - Part 1

05m 15s

Cloud Computing - Part 2

04m 29s

IoT And Industrial Controls

05m 11s

Application Architecture

05m 52s

Databases - Part 1

06m 0s

Databases - Part 2

04m 46s

Database Issues - Part 1

05m 12s

Database Issues - Part 2

09m 19s

Middleware

09m 0s

Mining Databases

05m 51s

Web Applications

07m 26s

Mobile Code Cookies

06m 4s

Mobile Code XSS

07m 33s

Mobile Code Java ActiveX

07m 10s

Web Applications Browser Email

04m 43s

Web Applications Input Validation

03m 21s

Web Applications OWASP

01m 56s

Chapter: Introduction To Cryptography

Cryptography - Part 1

05m 33s

Cryptography - Part 2

04m 22s

Cryptographic Algorithms

03m 45s

Strong Cryptography

04m 50s

Cryptographic Keys

03m 49s

Key Management

06m 1s

Chapter: Hashing Algorithms

Introduction To Hashing Algorithms

06m 18s

How Hashing Works

04m 29s

Hashing Algorithms

06m 53s

Strong Hashing Algorithms

03m 12s

Hashing Services

06m 8s

Chapter: Symmetric Key Algorithms

Symmetric Key Cryptography

05m 45s

Symmetric Key Services

08m 43s

Symmetric Key Algorithms

06m 50s

Cracking Symmetric Key Algorithms

03m 9s

Vigenere Symmetric Key Algorithm

06m 52s

Boolean Logic XOR

06m 27s

Kerckhoffs And Gilbert Vernam

05m 17s

Hebern, Enigma, Feistel, S And T

05m 13s

Block Ciphers And Stream Ciphers

05m 12s

DES And 3DES

06m 55s

AES, Block Ciphers And Variables

06m 56s

Block Cipher Modes - ECB And CBC

05m 47s

Block Cipher Modes - OFB And CFB

07m 40s

Block Cipher Modes - CTR

03m 10s

Message Authentication Code

03m 18s

MAC And HMAC

06m 43s

CBC-MAC And Symmetric Summary

04m 1s

Chapter: Asymmetric Key Algorithms

Asymmetric Key Cryptography

05m 31s

Asymmetric Key Services

06m 48s

Asymmetric Key Management

06m 12s

Key Distribution And Digital Signature

05m 53s

Digital Signature

05m 8s

Confidentiality And Digital Signature

06m 53s

Multiple Recipients

03m 19s

SSL And TLS

08m 6s

Asymmetric Key Algorithms - Diffie Hellman Merkle

07m 10s

RSA, ELGamal, ECC And DSS

07m 3s

Asymmetric Key Cryptography Review

06m 20s

Chapter: Cryptography In Use

Link End-To-End PKI

06m 47s

PKI - Part 1

07m 55s

PKI - Part 2

05m 21s

PGP And S/MIME

05m 12s

Set

04m 48s

VPN, SSL, TLS And Protocols

06m 0s

Chapter: Attacks On Cryptography

Introduction To Attacks On Cryptography

05m 35s

Brute Force, Dictionary, Hybrid And Rainbow

06m 6s

Plaintext, Ciphertext And Adaptive

07m 37s

Chapter: Physical Security

Introduction To Physical Security

06m 13s

Goals And Facility

06m 40s

Perimeter Defense And Access Control

06m 5s

Security Zones And Environment

05m 43s

Electrical Issues

06m 12s

Fire Safety

04m 28s

Fire Detectors

04m 3s

Fire Extinguishers And Sprinklers

05m 25s

Gas Suppressants And Fire Training

05m 45s

Chapter: Conclusion

Wrap Up

06m 57s