Skip to content

deezombiedude612/study-notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Study Notes

Scribbles and such and what not.

MATH 1554 Linear Algebra (Georgia Tech edX, GTx)

Instructor: Dr. Greg Mayer

Linear Algebra 1: Linear Equations

Filename Module
gtx-la-m01.pdf Linear Systems & Spans
gtx-la-m02.pdf Solution Sets & Linear Independence
gtx-la-m03.pdf Linear Transforms

Linear Algebra 2: Matrix Algebra

Filename Module
gtx-la-m04.pdf Matrix Addition and Scalar Subtraction
gtx-la-m05.pdf The Invertible Matrix Theorem and Applications
gtx-la-m06.pdf Computer Graphics and Subspaces

Linear Algebra 3: Determinants and Eigenvalues

Filename Module
gtx-la-m07.pdf Determinants
gtx-la-m08.pdf Markov Chains and Eigenvalues
gtx-la-m09.pdf Diagonalization and Page Rank

Linear Algebra 4: Orthogonality & Symmetric Matrices and the SVD

Filename Module
gtx-la-m10.pdf Orthogonal Projections
gtx-la-m11.pdf Gram-Schmidt
gtx-la-m12.pdf Least-Squares
gtx-la-m13.pdf Quadratic Forms and Constrained Optimization
gtx-la-m14.pdf The SVD

SE6002 Application Security (NTU AY2022/23 S2)

Instructors: Mr. Sven Schleier, Mr. William Koh & WithSecure Team

Filename Title
se6002-06.pdf Docker
se6002-07.pdf Container Security & Static Application Testing
se6002-08.pdf Penetration Testing & Appsec Fundamentals
se6002-09.pdf File Upload & Logic Flaws
se6002-10.pdf Authentication & Authorization
se6002-11.pdf Cross-Site Scripting & SQL Injection

SE6014 Security Monitoring & Threat Detection (NTU AY2023/24 S2)

Instructor: Mr. Vicky Ray

Filename Title
se6014-01.pdf Introduction, Foundations of Cyber Security Frameworks
se6014-02.pdf Malware Analysis
se6014-03.pdf Detection Engineering
se6014-04.pdf Cyber Threat Intelligence (CTI)

SE6016 Forensics (NTU AY2023/24 S2)

Instructor: Mr. Leonard Ong

Filename Title
se6016-01.pdf Overview
se6016-02.pdf Preparing for Incidents
se6016-03.pdf Containment, Eradication, Recovery, Post-Incident Activities
se6016-04.pdf Computer Forensics
se6016-05.pdf Memory Forensics
se6016-06.pdf Network Forensics
se6016-07.pdf Mobile Forensics
se6016-08.pdf Cloud Forensics