Lectures
- Introduction: 01-introduction.pdf, Recording
- Security Models: 02-security-models.pdf, Recording
- Identity, Authentication, Authorization: 03-identity-authentication-authorization.pdf, Recording
- Software Integrity, Supply Chain Security: 04-software-integrity-supply-chain.pdf, Recording
- Cryptography: 05-cryptography.pdf, Recording
- Injection: 06-injection.pdf, Recording
- Data Integrity: 07-data-integrity.pdf, Recording
- Programming Models: 08-programming-models.pdf, Recording
- Seminar: Recording
- Cloud Security: 10-cloud-security.pdf, Recording
- Seminar: Recording (Sorry, the first few minutes are missing)
- Development Process: 12-development-process.pdf, Recording
- Seminar: Recording
- Mobile security: 14-mobile-security.pdf, Recording