Bootstrapping a Security Research Project
Offered By: YouTube
Course Description
Overview
Learn how to bootstrap a security research project in this comprehensive conference talk from BSides Detroit 2016. Explore the fundamentals of applied and basic research, understand the pros and cons of conducting research, and discover various types of research questions. Delve into the epicycle of data analysis, asset acquisition strategies, and core research ideas. Gain insights into building a research team, setting up a lab environment, and developing a research workflow. Master the art of presenting research through print, visualizations, and code, while understanding the importance of responsible disclosure. Acquire valuable knowledge on defining success criteria, handling failure, and utilizing the research pipeline model to enhance your security research projects.
Syllabus
About Andrew Hay
Why Me?
Pasteur's Quadrant: Applied vs. Basic Research
Do You Look Like a Researcher?
Research Pros and cons
Should I Research Something?
Types of Questions
Epicycle of Data Analysis
Bootstrapping Research
A Word on Asset/Device Acquisition
My Favorite Places...
Core Research Ideas
Example Questions By Research Level
The Research Team
Sample lor Device Research Workflow
Suggested Lab Equipment and Software
Introduction
What Does Success Look Like?
What Does Failure Look Like?
Research Pipeline Model
Presenting Your Research: Print
Presenting Your Research: Visualizations
Presenting Your Research: Code
Defending Your Research
A Word About Responsible Disclosure
Summary
Further Reading: Courses
Related Courses
Social Network AnalysisUniversity of Michigan via Coursera Intro to Algorithms
Udacity Data Analysis
Johns Hopkins University via Coursera Computing for Data Analysis
Johns Hopkins University via Coursera Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX