Computer Security - Textbook View
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive overview of computer security challenges and best practices in this 48-minute Black Hat USA 1999 conference talk by Rebecca Bace. Delve into the real-world picture of security, covering topics such as software design implementation, system configuration management, and trust issues. Examine the complexities of modern systems, including buffer overflows, Windows Outlook Mail vulnerabilities, and active server page concerns. Gain insights into system reliability issues, TCP/IP permissions, and digital content security. Learn about misplaced trust, management challenges, and the changing culture of cybersecurity. Discover personal favorites and book recommendations from the speaker, and engage with thought-provoking questions to enhance your understanding of computer security beyond the textbook view.
Syllabus
Introduction
Becky Days
Shaquille ONeal
Jack ONeal
What is Computer Security
The Real Real Picture of Security
Software Design Implementation
System Configuration Management
Trust Issues
Microsoft
System Complexity
Buffer Overflows
Windows Outlook Mail
Change of culture
Time to market
System configuration and management
Active server pages
Cache manipulation and problems
Site Server
Management
Misplaced Trust
System Reliability Issues
Security Challenges
TCPIP Permissions
System Models
Digital Content
The Two Cents
Personal Favorites
Book Recommendations
Questions
Taught by
Black Hat
Related Courses
Securing Digital DemocracyUniversity of Michigan via Coursera Computer Science 101
Stanford University via Coursera Introduction to Cybersecurity for Business
University of Colorado System via Coursera Proactive Computer Security
University of Colorado System via Coursera How Computers Work
University of London International Programmes via Coursera