Electrical Engineering and Computer Science
Computer Systems Security
Lecture 1: Introduction, Threat Models
Lecture 2: Control Hijacking Attacks
Lecture 3: Buffer Overflow Exploits and Defenses
Lecture 4: Privilege Separation
Lecture 6: Capabilities
Lecture 7: Sandboxing Native Code
Lecture 8: Web Security Model
Lecture 9: Securing Web Applications
Lecture 10: Symbolic Execution
Lecture 11: Ur/Web
Lecture 12: Network Security
Lecture 13: Network Protocols
Lecture 14: SSL and HTTPS
Lecture 15: Medical Software
Lecture 16: Side-Channel Attacks
Lecture 17: User Authentication
Lecture 18: Private Browsing
Lecture 19: Anonymous Communication
Lecture 20: Mobile Phone Security
Lecture 21: Data Tracking
Lecture 22: Guest Lecture by MIT IS&T
Lecture 23: Security Economics
Don't show me this again
This is one of over 2,400 courses on OCW. Explore materials for this course in the pages linked along the left.
MIT OpenCourseWare is a free & open publication of material from thousands of MIT courses, covering the entire MIT curriculum.
No enrollment or registration. Freely browse and use OCW materials at your own pace. There's no signup, and no start or end dates.
Knowledge is your reward. Use OCW to guide your own life-long learning, or to teach others. We don't offer credit or certification for using OCW.
Made for sharing. Download files for later. Send to friends and colleagues. Modify, remix, and reuse (just remember to cite OCW as the source.)
Learn more at Get Started with MIT OpenCourseWare