From e67ca88c25564b4230d3d965158568e210d07b46 Mon Sep 17 00:00:00 2001 From: Pratyush Das Date: Tue, 20 Mar 2018 21:46:28 +0530 Subject: [PATCH] Fixed broken link --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 736d8b0..c70d9b5 100644 --- a/README.md +++ b/README.md @@ -731,7 +731,7 @@ Topics covered include probability theory and Bayesian inference; univariate dis - Course taught by [W. Owen Redwood](http://ww2.cs.fsu.edu/~redwood/) and [Xiuwen Liu](http://www.cs.fsu.edu/~liux/). It covers a wide range of computer security topics, starting from Secure C Coding and Reverse Engineering to Penetration Testing, Exploitation and Web Application Hacking, both from the defensive and the offensive point of view. - [Lectures and Videos](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html) - [Assignments](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/assignments.html) -- [CS 155](https://courseware.stanford.edu/pg/courses/349991/cs155-spring-2013) **Computer and Network Security** *Stanford* Lecture Notes Readings +- [CS 155](https://crypto.stanford.edu/cs155/) **Computer and Network Security** *Stanford* Lecture Notes Readings - Principles of computer systems security. Attack techniques and how to defend against them. Topics include: network attacks and defenses, operating system holes, application security (web, email, databases), viruses, social engineering attacks, privacy, and digital rights management. Course projects focus on building reliable code. Recommended: Basic Unix. Primarily intended for seniors and first-year graduate students. - [CS 161](http://www-inst.eecs.berkeley.edu/~cs161/sp15/) **Computer Security** *UC Berkeley* Lecture Notes - Introduction to computer security. Cryptography, including encryption, authentication, hash functions, cryptographic protocols, and applications. Operating system security, access control. Network security, firewalls, viruses, and worms. Software security, defensive programming, and language-based security. Case studies from real-world systems.