Scribbles and such and what not.
Instructor: Dr. Greg Mayer
Filename | Module |
---|---|
gtx-la-m01.pdf |
Linear Systems & Spans |
gtx-la-m02.pdf |
Solution Sets & Linear Independence |
gtx-la-m03.pdf |
Linear Transforms |
Filename | Module |
---|---|
gtx-la-m04.pdf |
Matrix Addition and Scalar Subtraction |
gtx-la-m05.pdf |
The Invertible Matrix Theorem and Applications |
gtx-la-m06.pdf |
Computer Graphics and Subspaces |
Filename | Module |
---|---|
gtx-la-m07.pdf |
Determinants |
gtx-la-m08.pdf |
Markov Chains and Eigenvalues |
gtx-la-m09.pdf |
Diagonalization and Page Rank |
Filename | Module |
---|---|
gtx-la-m10.pdf |
Orthogonal Projections |
gtx-la-m11.pdf |
Gram-Schmidt |
gtx-la-m12.pdf |
Least-Squares |
gtx-la-m13.pdf |
Quadratic Forms and Constrained Optimization |
gtx-la-m14.pdf |
The SVD |
Instructors: Mr. Sven Schleier, Mr. William Koh & WithSecure Team
Filename | Title |
---|---|
se6002-06.pdf |
Docker |
se6002-07.pdf |
Container Security & Static Application Testing |
se6002-08.pdf |
Penetration Testing & Appsec Fundamentals |
se6002-09.pdf |
File Upload & Logic Flaws |
se6002-10.pdf |
Authentication & Authorization |
se6002-11.pdf |
Cross-Site Scripting & SQL Injection |
Instructor: Mr. Vicky Ray
Filename | Title |
---|---|
se6014-01.pdf |
Introduction, Foundations of Cyber Security Frameworks |
se6014-02.pdf |
Malware Analysis |
se6014-03.pdf |
Detection Engineering |
se6014-04.pdf |
Cyber Threat Intelligence (CTI) |
Instructor: Mr. Leonard Ong
Filename | Title |
---|---|
se6016-01.pdf |
Overview |
se6016-02.pdf |
Preparing for Incidents |
se6016-03.pdf |
Containment, Eradication, Recovery, Post-Incident Activities |
se6016-04.pdf |
Computer Forensics |
se6016-05.pdf |
Memory Forensics |
se6016-06.pdf |
Network Forensics |
se6016-07.pdf |
Mobile Forensics |
se6016-08.pdf |
Cloud Forensics |