Completed
Security-by-Design SW Components
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 SYSTEM SECURITY ASPECTS
- 3 Secure System Architecture
- 4 Security-by-Design SW Components
- 5 Secure Software? Not in general!
- 6 APPLICATION HARDENING: LINUX SECURITY FEATURES
- 7 Application Hardening Linux Security Features
- 8 APPLICATION HARDENING: HANDS-ON
- 9 Hands-On: Security Features
- 10 Application Hardening Hands-On: Connman
- 11 Hands-On: Bluetooth tethering - Connman & BlueZ
- 12 APPLICATION HARDENING: CONCLUSION
- 13 Application Hardening Conclusion