Lecture 1 - Introduction to the Course
Lecture 2 - Motivation and Overview
Lecture 3 - Review of Basic Concepts and Terminology in Communication Networks - Part 1
Lecture 4 - Review of Basic Concepts and Terminology in Communication Networks - Part 2
Lecture 5 - Review of Basic Concepts and Terminology in Communication Networks - Part 3
Lecture 6 - Review of Basic Concepts and Terminology in Communication Networks - Part 4
Lecture 7 - Review of Basic Concepts and Terminology in Communication Networks - Part 5
Lecture 8 - Review of Basic Concepts and Terminology in Communication Networks - Part 6
Lecture 9 - Different Types of Attacks on Networks
Lecture 10 - Mathematical Background for Cryptography
Lecture 11 - Principle of Cryptography - Part 1
Lecture 12 - Principle of Cryptography - Part 2
Lecture 13 - Principle of Cryptography - Part 3
Lecture 14 - Principle of Cryptography - Part 4
Lecture 15 - Principle of Cryptography - Part 5
Lecture 16 - Message Integrity, Cryptographic Hash Functions and Digital Signatures - Part 1
Lecture 17 - Message Integrity, Cryptographic Hash Functions and Digital Signatures - Part 2
Lecture 18 - Message Integrity, Cryptographic Hash Functions and Digital Signatures - Part 3
Lecture 19 - Message Integrity, Cryptographic Hash Functions and Digital Signatures - Part 4
Lecture 20 - Authentication - Part 1
Lecture 21 - Authentication - Part 2
Lecture 22 - Authentication - Part 3
Lecture 23 - Authentication - Part 4
Lecture 24 - Authentication - Part 5
Lecture 25 - Authentication - Part 6
Lecture 26 - Public Key Infrastructure - Part 1
Lecture 27 - Public Key Infrastructure - Part 2
Lecture 28 - Secure Email - Part 1
Lecture 29 - Secure Email - Part 2
Lecture 30 - Secure Sockets Layer (SSL) and Transport Layer Security (TLS) - Part 1
Lecture 31 - Secure Sockets Layer (SSL) and Transport Layer Security (TLS) - Part 2
Lecture 32 - Structure of an intergenic fitness landscape
Lecture 33 - Structure of an intergenic fitness landscape
Lecture 34 - Large scale fitness landscape (folA in E. coli)
Lecture 35 - Fixation probability of a beneficial mutation in a chemostat
Lecture 36 - Marbles in a jar: role of chance in dictating evolution
Lecture 37 - Securing Wireless LANs - Part 3
Lecture 38 - Securing Wireless LANs - Part 4
Lecture 39 - Securing Wireless LANs - Part 5
Lecture 40 - Securing Wireless LANs - Part 6
Lecture 41 - Securing Wireless LANs - Part 7
Lecture 42 - Securing Wireless LANs - Part 8
Lecture 43 - Wireless Cellular Network Security - Part 1
Lecture 44 - Wireless Cellular Network Security - Part 2
Lecture 45 - Wireless Cellular Network Security - Part 3
Lecture 46 - Wireless Cellular Network Security - Part 4
Lecture 47 - Wireless Cellular Network Security - Part 5
Lecture 48 - Wireless Cellular Network Security - Part 6
Lecture 49 - Wireless Cellular Network Security - Part 7
Lecture 50 - Wireless Cellular Network Security - Part 8
Lecture 51 - Firewalls and Intrusion Detection Systems - Part 1
Lecture 52 - Firewalls and Intrusion Detection Systems - Part 2
Lecture 53 - Firewalls and Intrusion Detection Systems - Part 3
Lecture 54 - Firewalls and Intrusion Detection Systems - Part 4
Lecture 55 - Firewalls and Intrusion Detection Systems - Part 5
Lecture 56 - Firewalls and Intrusion Detection Systems - Part 6
Lecture 57 - Firewalls and Intrusion Detection Systems - Part 7
Lecture 58 - Firewalls and Intrusion Detection Systems - Part 8
Lecture 59 - Tor: The Onion Router - Part 1
Lecture 60 - Tor: The Onion Router - Part 2
Lecture 61 - The Bitcoin Cryptocurrency - Part 1
Lecture 62 - The Bitcoin Cryptocurrency - Part 2
Lecture 63 - The Bitcoin Cryptocurrency - Part 3
Lecture 64 - The Bitcoin Cryptocurrency - Part 4
Lecture 65 - The Bitcoin Cryptocurrency - Part 5
Lecture 66 - The Bitcoin Cryptocurrency - Part 6
Lecture 67 - Cloud Security - Part 1
Lecture 68 - Cloud Security - Part 2
Lecture 69 - Cloud Security - Part 3
Lecture 70 - Cloud Security - Part 4
Lecture 71 - Security of the Internet of Things (IoT), Hardware Security - Part 1
Lecture 72 - Security of the Internet of Things (IoT), Hardware Security - Part 2
Lecture 73 - Security of the Internet of Things (IoT), Hardware Security - Part 3
Lecture 74 - Post-Quantum Cryptography