{"id":651,"date":"2012-04-09T10:28:58","date_gmt":"2012-04-09T07:28:58","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=651"},"modified":"2012-04-09T10:28:58","modified_gmt":"2012-04-09T07:28:58","slug":"network-security-and-forensics-lectures-by-buchanan","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=651","title":{"rendered":"Network Security and Forensics lectures by Buchanan"},"content":{"rendered":"<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Bill_Buchanan_%28computer_scientist%29\">Bill Buchanan<\/a> is a <a href=\"http:\/\/www.iidi.napier.ac.uk\/c\/people\/peopleid\/79\">Professor<\/a> at Edinburgh Napier University (UK), and he has made several lectures available in Network Security and Forensics. I highly recommend this material to anyone.<\/p>\n<h3>Book Related track &#8220;Security and Network Forensics&#8221;<\/h3>\n<p>The book from 2011 is called <a href=\"http:\/\/www.crcpress.com\/product\/isbn\/9780849335686;jsessionid=sJloii13cb+EEemykegUcg**\">Introduction to Security and Network Forensics<\/a>.<\/p>\n<p>Book related site has the same title &#8220;<a href=\"http:\/\/asecuritybook.com\/\">Introduction to Security and Network Forensics<\/a>&#8220;.<\/p>\n<p>The site contains both <strong>videos<\/strong> and <strong>presentations<\/strong> (pdf files):<\/p>\n<p><img loading=\"lazy\" alt=\"Buchanan-fundamentals\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2012\/04\/buchanan-fundamentals.png\" width=\"225\" height=\"169\" \/><img loading=\"lazy\" alt=\"Buchanan-ids\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2012\/04\/buchanan-ids-1.png\" width=\"225\" height=\"157\" \/><img loading=\"lazy\" alt=\"Buchanan-encryption\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2012\/04\/buchanan-encryption.png\" width=\"225\" height=\"158\" \/>&#8230;<\/p>\n<blockquote>\n<p>1. Introduction to Security<br \/>\n2. Principles of IDS<br \/>\n3. Principles of Encryption<br \/>\n4. Principles of Authentication<br \/>\n5. Software Security<br \/>\n6. Network Security<br \/>\n7. Introduction to Risk<br \/>\n8. Threats<br \/>\n9. Network Forensics<br \/>\n10. Obfuscation and Data Hiding<br \/>\n11. Web Infrastructures<br \/>\n12. Cloud Computing<\/p>\n<\/blockquote>\n<p>The videos and presentations above provide a good learning set into the subject!<\/p>\n<h3>Additional Information<\/h3>\n<p>Buchanan is teaching a related course called &#8220;<a href=\"http:\/\/www.courses.napier.ac.uk\/courses.aspx?ID=%2fAdvancedSecurityAndDigitalForensics_W56731.htm\">Advanced Security and Digital Forensics<\/a>&#8220;. (For his subject presentation, see the second video on the right.) At his home pages, course related <a href=\"http:\/\/buchananweb.co.uk\/index_asfc_napier.html\">material<\/a> is available. It is very much the same as mentioned earlier. For more information about related subjects etc., it is worth to look his <a href=\"http:\/\/buchananweb.co.uk\/\">home site<\/a> in general. Buchanan&#8217;s page at <a href=\"http:\/\/www.cdcs.napier.ac.uk\/c\/people\/peopleid\/79\">CDCS<\/a> (Centre for Distributed Computing, Networking and Security).<\/p>\n<p>Buchanan has published more than 100 videos at youtube with the name &#8220;<a href=\"http:\/\/www.youtube.com\/user\/billatnapier\">billatnapier<\/a>&#8220;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bill Buchanan is a Professor at Edinburgh Napier University (UK), and he has made several lectures available in Network Security and Forensics. I highly recommend this material to anyone. Book Related track &#8220;Security and Network Forensics&#8221; The book from 2011 &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=651\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[45,44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/651"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=651"}],"version-history":[{"count":0,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/651\/revisions"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}