23:39Lecture 11 System Security Part 2 RansomwareInformation Security & Cyber Laws53 views·4 years ago
30:13Lecture 6 Adversarial Threats Part 4 Malicious CodeInformation Security & Cyber Laws256 views·4 years ago
22:26Lecture 5 Adversarial Threats Part 3 Malicious HackersInformation Security & Cyber Laws106 views·4 years ago
20:56Lecture 12 System Security Part 3 Rootkits and BotnetsInformation Security & Cyber Laws327 views·4 years ago
25:45Lecture 16 Social Engineering and Phishing AttacksInformation Security & Cyber Laws76 views·4 years ago
14:38Lecture 17 Recovering from viruses, worms, and trojan horsesInformation Security & Cyber Laws58 views·4 years ago
19:01Lecture 19 Network Attack Clasification Intrruption, Interception, Modification, FabricationInformation Security & Cyber Laws2.1K views·4 years ago