Author Archives: Udacity

Operating Systems Defined

June 2nd, 2020 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at source


Vulnerabilities and Attacks

April 3rd, 2019 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 source


Malware Obfuscation

June 6th, 2016 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 2016-06-06 17:57:47


Why Cyber Security?

June 6th, 2016 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 video, sharing,


XSRF vs XSS

June 6th, 2016 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 2016-06-06 17:48:02


XSS Example

June 6th, 2016 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 video, sharing,


Types of Cryptography

July 6th, 2015 | πŸ•’

This video is part of the Udacity course “Intro to Information Security”. Watch the full course at https://www.udacity.com/course/ud459 2015-07-06 16:59:30


Secret Sharing – Applied Cryptography

February 23rd, 2015 | πŸ•’

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387. 2015-02-23 21:02:59 source


Hash Collision – Applied Cryptography

February 23rd, 2015 | πŸ•’

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387. 2015-02-23 21:02:24 source