Course Classes
Computer systems security by MIT

46

Start course

1. Introduction, Threat Models01h17m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

2. Control Hijacking Attacks01h27m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

3. Buffer Overflow Exploits and Defenses01h21m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

4. Privilege Separation01h23m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

6. Capabilities01h21m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich continues the topic of privilege separation, discussing the usage of capabilities with regards to privilege.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

7. Sandboxing Native Code01h23m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich introduces the Native Client system, and its approach to software fault isolation.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

8. Web Security Model01h22m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens introduces the concept of web security, specifically as it relates to client-side applications and web browser security models.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

9. Securing Web Applications01h22m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens continues looking at how to build secure web applications.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

10. Symbolic Execution01h22m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Armando Solar-Lezama

In this lecture, Professor Solar-Lezama from MIT CSAIL presents the concept of symbolic execution.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

11. Ur/Web01h20m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich, Adam Chlipala

In this lecture, Professor Chlipala discusses Ur/Web, the programming language he created for modern web applications.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

12. Network Security01h18m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

13. Network Protocols01h21m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses the Kerberos authentication service.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

14. SSL and HTTPS01h18m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

15. Medical Software01h15m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Kevin Fu

In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

16. Side-Channel Attacks01h22m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses side-channel attacks, specifically timing attacks.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

17. User Authentication01h19m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens discusses authentication schemes and their implementations.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

18. Private Browsing01h20m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

19. Anonymous Communication01h20m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nick Mathewson

In this lecture, Nick Mathewson delivers a guest lecture on Tor and Anonymous communication.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

20. Mobile Phone Security01h22m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses the Android platform and its security design.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

21. Data Tracking01h19m

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: http://ocw.mit.edu/6-858F14
Instructor: James Mickens

In this lecture, Professor Mickens discusses the concept of taint tracking, looking at information flow analysis in the context of the Android platform.

License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

Our project is also available at:
Spanish Portuguese Hindi

Our best free courses

1

English lessons by Sonia

07 hours and 15 minutes

187

2

Web Development for beginners by LearnCode.academy

05 hours and 21 minutes

184

3

First Aid Training by St John Ambulance

02 hours and 40 minutes

168

4

Business Administration by Animate U

01 hours and 25 minutes

152

5

Android for beginners by The new boston

10 hours and 47 minutes

128

6

Social media marketing by Freemium

02 hours and 01 minutes

117

7

Business english course by BED

02 hours and 44 minutes

104

8

Self-Defense by Ando Mierzwa

01 hours and 24 minutes

104

9

English grammar by Oxford Online English

05 hours and 37 minutes

95

10

Investing like Warren Buffett with Preston Pysh

03 hours and 29 minutes

93

11

Computer Science by CrashCourse

07 hours and 54 minutes

91

12

Human resource management concepts by Gregg Learning

08 hours and 14 minutes

90

Get to know a little about our project that has been changing the lives of thousands of people through free courses.

+700 free courses +300 categories +1 million downloads +50 Thousand certificates issued Courses in 3 different languages

Found a good course on youtube and want to see it in our project, click here to indicate new courses.