Introductory Video ITT807
NORKHUSHAINI AWANG
Introductory Video ITT807
1:15
Cutting-Edge Web Security
NORKHUSHAINI AWANG
Cutting-Edge Web Security
32:56
Injection Flaws
NORKHUSHAINI AWANG
Injection Flaws
41:33
Sessions
NORKHUSHAINI AWANG
Sessions
39:10
HTTPS
NORKHUSHAINI AWANG
HTTPS
42:46
INTRODUCTION
NORKHUSHAINI AWANG
INTRODUCTION
37:43
Unified Modeling Language UML
NORKHUSHAINI AWANG
Unified Modeling Language UML
43:46
Web Applications Architecture
NORKHUSHAINI AWANG
Web Applications Architecture
44:51
Requirements Engineering for Web Applications - Part 2
NORKHUSHAINI AWANG
Requirements Engineering for Web Applications - Part 2
19:54
Requirements Engineering for Web Applications - Part 1
NORKHUSHAINI AWANG
Requirements Engineering for Web Applications - Part 1
13:09
Malware and Social Engineering Attacks
NORKHUSHAINI AWANG
Malware and Social Engineering Attacks
45:06
An Introduction to Web Engineering
NORKHUSHAINI AWANG
An Introduction to Web Engineering
25:52
Introduction to Security
NORKHUSHAINI AWANG
Introduction to Security
38:25
REVISION TOPIC 2 & 3
NORKHUSHAINI AWANG
REVISION TOPIC 2 & 3
30:21
REVISION TOPIC 4
NORKHUSHAINI AWANG
REVISION TOPIC 4
15:37
REVISION TOPIC 1
NORKHUSHAINI AWANG
REVISION TOPIC 1
30:20
GROUP 7
NORKHUSHAINI AWANG
GROUP 7
53:16
LECTURE 11
NORKHUSHAINI AWANG
LECTURE 11
20:34
Risk Mitigation
NORKHUSHAINI AWANG
Risk Mitigation
56:43
GROUP 7
NORKHUSHAINI AWANG
GROUP 7
1:29:49
GROUP 7
NORKHUSHAINI AWANG
GROUP 7
34:24
LECTURE 10
NORKHUSHAINI AWANG
LECTURE 10
20:09
GROUP 6
NORKHUSHAINI AWANG
GROUP 6
1:04:48
Vulnerability Assessment and Data Security
NORKHUSHAINI AWANG
Vulnerability Assessment and Data Security
44:05
GROUP 6
NORKHUSHAINI AWANG
GROUP 6
39:21
LECTURE 9
NORKHUSHAINI AWANG
LECTURE 9
24:24
GROUP 5
NORKHUSHAINI AWANG
GROUP 5
55:31
GROUP 5
NORKHUSHAINI AWANG
GROUP 5
49:06
Mobile and Embedded Device Security
NORKHUSHAINI AWANG
Mobile and Embedded Device Security
37:57
GROUP 5
NORKHUSHAINI AWANG
GROUP 5
48:22
LECTURE 8
NORKHUSHAINI AWANG
LECTURE 8
28:40
GROUP 4
NORKHUSHAINI AWANG
GROUP 4
40:08
GROUP 4
NORKHUSHAINI AWANG
GROUP 4
33:57
GROUP 4
NORKHUSHAINI AWANG
GROUP 4
49:07
Client and Application Security
NORKHUSHAINI AWANG
Client and Application Security
28:02
LECTURE 7
NORKHUSHAINI AWANG
LECTURE 7
29:00
GROUP 3
NORKHUSHAINI AWANG
GROUP 3
43:52
GROUP 3 PART 2
NORKHUSHAINI AWANG
GROUP 3 PART 2
17:37
GROUP 3 PART 1
NORKHUSHAINI AWANG
GROUP 3 PART 1
56:15
Wireless Network Security
NORKHUSHAINI AWANG
Wireless Network Security
47:05
GROUP 3 Part 1
NORKHUSHAINI AWANG
GROUP 3 Part 1
26:11
GROUP 3 Part 2
NORKHUSHAINI AWANG
GROUP 3 Part 2
30:35
SQL Injection & Metasploit Tool
NORKHUSHAINI AWANG
SQL Injection & Metasploit Tool
15:39
LECTURE 6
NORKHUSHAINI AWANG
LECTURE 6
27:43
GROUP 2
NORKHUSHAINI AWANG
GROUP 2
58:40
GROUP 2
NORKHUSHAINI AWANG
GROUP 2
47:41
Administering a Secure Network
NORKHUSHAINI AWANG
Administering a Secure Network
52:00
GROUP 2
NORKHUSHAINI AWANG
GROUP 2
37:42
IPTABLES
NORKHUSHAINI AWANG
IPTABLES
14:01
GROUP 1
NORKHUSHAINI AWANG
GROUP 1
42:03
LECTURE 5
NORKHUSHAINI AWANG
LECTURE 5
24:14
GROUP 1
NORKHUSHAINI AWANG
GROUP 1
29:31
GROUP 1
NORKHUSHAINI AWANG
GROUP 1
20:54
Network Security Devices, Design, and Technology
NORKHUSHAINI AWANG
Network Security Devices, Design, and Technology
54:20
LECTURE 4
NORKHUSHAINI AWANG
LECTURE 4
24:06
Networking and Server Attacks
NORKHUSHAINI AWANG
Networking and Server Attacks
46:01
Basic Cryptography
NORKHUSHAINI AWANG
Basic Cryptography
54:16
LECTURE 3
NORKHUSHAINI AWANG
LECTURE 3
47:27
LECTURE 1
NORKHUSHAINI AWANG
LECTURE 1
43:32
LECTURE 2
NORKHUSHAINI AWANG
LECTURE 2
37:53