Completed
Holistic view of threats
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Foundation Is Rotting and the Basement Is Flooding
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Background
- 3 Information Security
- 4 Chest vs Poker
- 5 Common Sense
- 6 Cyber Civilians
- 7 State of the Art
- 8 Technical Debt
- 9 COBOL
- 10 Trusted Computing Base
- 11 Face Dancer
- 12 LowLevel Attacks
- 13 SteppingPants
- 14 LegBack
- 15 ShadowWalker
- 16 Paging and Virtual Memory
- 17 Map in Physical Memory
- 18 Virtual Addresses
- 19 ECAM
- 20 Page Directory Entry
- 21 The best part
- 22 Scratchpad data
- 23 Alignment caveats
- 24 Design flaws
- 25 New features
- 26 Lazy attackers
- 27 Youre going to be rich
- 28 Youre game over
- 29 Google Apps for government
- 30 The least privileged principle
- 31 Trust of unknown entities
- 32 How do you communicate security
- 33 Holistic view of threats
- 34 Who is that actually harming
- 35 Selfish goal
- 36 Low hanging fruit attacker
- 37 Advanced persistent targeted threat
- 38 How to stand out
- 39 Segmentation
- 40 Competitors
- 41 KPIs
- 42 Data Liability
- 43 Predict Costs
- 44 Balance Security Usability Support
- 45 Information Security Debt
- 46 Stop Patching
- 47 Model Your Risk
- 48 Return on Investment
- 49 Worst Examples of Security
- 50 OS X Security