Channel Avatar

Kees Leune @UC0CxHYC9WI-6FU0jTjs9Blw@youtube.com

756 subscribers - no pronouns :c

Kees Leune is a professor at Adelphi University, located in


03:15
Executing long-running commands on Linux with tmux
20:57
Post-exploitation activities
08:50
SQL Injection - Part 4
13:19
SQL Injection - Part 3
11:08
SQL Injection - Part 2
13:33
SQL Injection - Part 1
16:12
Installing and using John the Ripper on Linux
07:43
Embedded SQL using JDBC
21:13
Enterprise network security technologies
24:24
Network Security: Diagnostic utilities
22:33
Network Security: Domains and IP addresses
19:40
Network Security: Internet routing
05:13
Installing Cygwin and Eclipse on Windows 10
14:47
Query Processing
11:12
Database Backup and Recovery
20:10
Database Indexes and b-trees
21:07
Database Transactions and Concurrency
18:08
Database Application and network security
15:05
Authentication, Authorization and Access Control in Database Management Systems
08:02
Introduction to database security
09:36
Database Encryption
14:30
Embedding SQL in Python application
14:49
Nested Queries (subqueries) in SQL
16:53
SQL: Multi-table queries using JOINs
12:52
Aggregate Functions in SQL
14:27
SQL: single-table operations
16:50
SQL Data Definition Language
09:58
About SQL
17:49
Data Normalization: Normal Forms
09:18
Data Normalization: Decomposition and Dependency
31:12
Relational Algebra
23:28
The Relational Model
15:09
Data Modeling
15:00
Systems Modeling
16:01
Databases Architecture and the Web
16:04
The Database Environment
17:17
Database Terms
12:42
Cyber Threat Modeling
22:02
Data Modeling in Cyber Security
16:06
Human Factors: Social Engineering
09:19
Human Factors: Awareness, Training, and Education
19:51
Human Factors: Administrative Controls
19:52
Vulnerability Discovery
16:22
Vulnerability Management
14:08
Vulnerability Disclosure Strategies
17:37
The Vulnerability Life Cycle
13:11
Role-Based Access Control
13:46
Mandatory Access Control
10:38
Discretionary Access Control
14:13
Access Control Principles
16:08
Introduction to cryptography: Risks and Pitfalls
12:18
Introduction to Cryptography: Digital Signatures
08:40
Introduction to Cryptography: Symmetric vs. Asymmetric Crypto
11:51
Authentication - Single Sign-On
14:06
Authentication Attacks
18:36
Authentication - Introduction
12:53
Secure Design - Security Frameworks
20:33
Secure Design - Principles
15:20
Secure Design - Introduction
14:06
Cyber Law - Ethics