Lectures of Cyber ​​Security Department

Data Structure – Nadia M.Mohammed

1 Linked List 1 & 2 – Nadia M.Mohammed 2 Linked List 3 – Nadia M.Mohammed 3 Double Linked List – Nadia M.Mohammed 4 Recursive Thinking – Nadia M.Mohammed 5 Tree1 – Nadia M.Mohammed Lecture 1 Data Structure – Nadia M.Mohammed Lecture 2 Algorithm – Nadia M.Mohammed Lecture 3 Array – Nadia M.Mohammed Lecture 4 Array – Nadia M.Mohammed Lecture 5 & 6 Stack – Nadia M.Mohammed Lecture1 – Nadia M.Mohammed Lecture2 – Nadia M.Mohammed Lecture2,3 – Nadia M.Mohammed Lecture3 – Nadia M.Mohammed Lecture4 – Nadia M.Mohammed(1) Lecture4 – Nadia M.Mohammed Lecture5 – Nadia M.Mohammed Lecture6 – Nadia M.Mohammed Lecture6,7 – Nadia M.Mohammed Lecture7 – Nadia M.Mohammed Lecture8,9 – Nadia M.Mohammed(1) Lecture8,9 – Nadia M.Mohammed Lecture9,10 – Nadia M.Mohammed Lecture10,11 – Nadia M.Mohammed Lecture11,12 – Nadia M.Mohammed Lecture12 – Nadia M.Mohammed

Dr.Sufyan Salim

First four Lectures – Dr.Sufyan Salim Second four Lectures – Dr.Sufyan Salim Third four Lectures – Dr.Sufyan Salim

OOP1- Ann Kazzaz

OOP1_Lecture11_Discussion – Ann Kazzaz OOP1-Lecture_10 – Ann Kazzaz OOP1-Lecture01 – Ann Kazzaz OOP1-Lecture02 – Ann Kazzaz OOP1-Lecture03 – Ann Kazzaz OOP1-Lecture04 – Ann Kazzaz OOP1-Lecture05 – Ann Kazzaz OOP1-Lecture06 – Ann Kazzaz OOP1-Lecture07 – Ann Kazzaz OOP1-Lecture08 – Ann Kazzaz OOP1-Lecture09 – Ann Kazzaz OOP1-Lecture12 – Ann Kazzaz OOP2_Lec01 – Ann Kazzaz OOP2_Lec02 – Ann Kazzaz OOP2_Lec03 – Ann Kazzaz OOP2_Lec04 – Ann Kazzaz OOP2_Lec05 – Ann Kazzaz OOP2_Lec06 – Ann Kazzaz OOP2_Lec07 – Ann Kazzaz OOP2_Lec08 – Ann Kazzaz OOP2_Lec09 – Ann Kazzaz OOP2_Lec10 – Ann Kazzaz OOP2_Lec11 – Ann Kazzaz OOP2_Lec12 – Ann Kazzaz

Software Security – Sundus Abid

lecture1_introduction to sw security – Sundus Abid lecture2_ secure coding – Sundus Abid lecture3-datasecurity – Sundus Abid lecture4- Authentication&Passwords – Sundus Abid lecture5_threat modeling – Sundus Abid security incident-lecture7 – Sundus Abid web application security-lecture6 – Sundus Abid