Bootstrapping a Security Research Project

Bootstrapping a Security Research Project

via YouTube Direct link

Epicycle of Data Analysis

6 of 18

6 of 18

Epicycle of Data Analysis

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Bootstrapping a Security Research Project

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Pasteur's Quadrant: Applied vs. Basic Research
  3. 3 Do You Look Like a Researcher?
  4. 4 Research Pros and Cons
  5. 5 Types of Questions
  6. 6 Epicycle of Data Analysis
  7. 7 A Word on Asset/Device Acquisition
  8. 8 Core Research Ideas Circuitry
  9. 9 The Research Team
  10. 10 Sample lot Device Research Workflow
  11. 11 Suggested Lab Equipment and Software
  12. 12 Knowing When To Stop
  13. 13 What Does Success Look Like?
  14. 14 What Does Failure Look Like?
  15. 15 Presenting Your Research: Print
  16. 16 Presenting Your Research: Code
  17. 17 Defending Your Research
  18. 18 A Word About Responsible Disclosure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.