Content Gallery
Available Content:

Lightning in the Skies: Cloud Security Breaches and How to Mitigate Them
Discover how to prepare yourself to architect secure cloud applications and prevent cyberattacks.

Cyber Security and COVID-19
The recent transition to remote workforces can make companies vulnerable to new cyberattacks. In this webinar, Neil Daswani shared advice on how to maintain security through this pandemic and beyond.

6 essential traits you need to look for in an online graduate certificate program

Fitting professional education into a busy schedule
Learn techniques to help you balance online education with a full-time career.

What Does the Future Hold for Cryptocurrency?
Join Joseph A. Grundfest, professor at the Stanford Law School, and find "The truth about trustless systems".

Bugs in Crypto Implementations
Professor Dan Boneh | May 29, 2018
How can you be sure that your messages are safe and secure? Realize the vulnerabilities in WEP and iMessage.

Lessons from Mirai and the Current State of IoT Security
Professor Zakir Durumeric | June 5, 2018
Who was responsible for the Mirai Bonet? What were their motives? Study the evolution of this major attack and its impact on IoT Security.

Beyond Cryptocurrency: Blockchain for the Real World
David Mazières | June 12, 2018
Look past powerhouses like Bitcoin and Ethereum to the fundamentals of blockchain technology and its value to real world applications.

Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bunz | June 18, 2018
While cryptocurrency transactions are difficult to compromise, they have significant downfalls. Learn to keep crypto transactions private with an optimistic solution.

Doubly-efficient zkSNARKs Without Trusted Setup
Riad Wahby | June 26, 2018
zkSNARKs: Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. What are they, and what is their relationship to cryptocurrency?

A Guardian Agent for Secure Delegation
Dima Kogan | July 2, 2018
Is Secure Shell (SSH) protocol truly secure? Discover the vulnerabilities in today’s SSH protocols and how a new guardian agent can provide secure delegation.

Rocket: Securing the Web at Compile-time
Sergio Benitez | July 10, 2018
Learn why companies such as NPM, System76 and Mozilla have implemented Rocket (for Rust) in production.