Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Hash, Hack, Code - Emerging Trends in Cyber Security

Description

Hashing schemes for passwords. Monitoring the Internet of Things. Securing program control flow. These are the latest developments in cyber security you need to understand for defending against various attack techniques.

Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives deeper into how you can protect networks and prevent harmful viruses and threats.

Presented by the Stanford Center for Professional Development in association with the Graduate Certificate in Cyber Security (http://stanford.io/1TPcKYD) and Professional Certificate in Advanced Computer Security (http://computersecurity.stanford.edu)

Tags

Syllabus

Introduction.
Webinar overview.
A (small) sample of password breaches.
How to store passwords.
How to hash?.
Audience Poll How much faster is custom hardware at evaluating SHA256 compared to a commodity CPU? (say, on an intel Skylake Xeon).
Why is custom hardware faster?.
How to hash: a better approach Scrypt a slow hash function AND need lots of memory to evaluate custom hardware not much faster than commodity CPU.
Balloon hashing.
Control flow integrity (CFI) TABEL'OS.
Cryptographic Control Flow Integrity (CCFI) Threat model.
Are you nuts? Performance!!.

Online Course


Hash, Hack, Code - Emerging Trends in Cyber Security

Affiliate notice

Hashing schemes for passwords. Monitoring the Internet of Things. Securing program control flow. These are the latest developments in cyber security you need to understand for defending against various attack techniques.

Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives deeper into how you can protect networks and prevent harmful viruses and threats.

Presented by the Stanford Center for Professional Development in association with the Graduate Certificate in Cyber Security (http://stanford.io/1TPcKYD) and Professional Certificate in Advanced Computer Security (http://computersecurity.stanford.edu)

Introduction.
Webinar overview.
A (small) sample of password breaches.
How to store passwords.
How to hash?.
Audience Poll How much faster is custom hardware at evaluating SHA256 compared to a commodity CPU? (say, on an intel Skylake Xeon).
Why is custom hardware faster?.
How to hash: a better approach Scrypt a slow hash function AND need lots of memory to evaluate custom hardware not much faster than commodity CPU.
Balloon hashing.
Control flow integrity (CFI) TABEL'OS.
Cryptographic Control Flow Integrity (CCFI) Threat model.
Are you nuts? Performance!!.