Completed
ACCESS CONTROL
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introduction to Embedded Linux Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Embedded Linux Conference North America 2020
- 2 INTRODUCTION TO SECURITY
- 3 SECURITY CONCEPTS III
- 4 THREAT MODELING
- 5 STRIDE
- 6 DREAD
- 7 THREAT MODEL EXAMPLE
- 8 SECURE BOOT CONCEPTS
- 9 HOW DOES IT WORK?
- 10 SECURE BOOT ON i.MX6
- 11 CODE AND DATA ENCRYPTION
- 12 SECURE BOOT WITH ENCRYPTION
- 13 WHERE IS THE KEY?
- 14 PRIVATE KEY STORAGE
- 15 KEY STORAGE ON .MX PROCESSORS
- 16 KEY STORAGE ON EXTERNAL DEVICES
- 17 SECURE ELEMENT
- 18 SECURE CODING
- 19 STATIC CODE ANALYSIS
- 20 RUNTIME PROTECTIONS
- 21 FUZZING TOOLS
- 22 PERMISSIONS
- 23 ACCESS CONTROL
- 24 LINUX CAPABILITIES
- 25 DAC vs MAC
- 26 LINUX SECURITY MODULES
- 27 APPLICATION SANDBOXING
- 28 LINUX CONTAINERS
- 29 CONTAINERS AND SECURITY
- 30 TEE IMPLEMENTATION
- 31 UPDATE SYSTEM AND SECURITY
- 32 UPDATE CHALLENGES
- 33 UPDATE STRATEGIES
- 34 NETWORK SECURITY
- 35 DEFENSE IN DEPTH!
- 36 SECURITY GENERAL RULES
- 37 DESIGN FOR SECURITY