MERLOT Materials

Show results for

Filter by

1-24 of 59 results for MERLOT Materials

This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and discusses... see more

This demonstration module provides an overview of the key concepts and goals of information security and how information... see more

A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES, Diffie-Hellman,... see more

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the... see more

This is a free, online textbook.  "Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever prescriptions... see more

Students analyze and suggest solutions to an onslaught of network outages at C-Bay, an online Real Estate Auction start... see more

Designed as part of a network security curriculum, this scenario-based task simulates a challenge for information... see more

This course focuses on the fundamentals of information security that are used in protecting both the information present... see more

This is a free textbook that is offered by Amazon for reading on a Kindle.  Anybody can read Kindle books—even without a... see more

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more

This site gives information about the significance of software updates and a firewall in protecting the integrity of data... see more

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more

 These sequence of labs will give you practical experience with common attacks and counter measures.

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the... see more

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of... see more

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept... see more

Students work on network monitoring procedures at C-Bay, an online Real Estate auction company. They recommend intrusion... see more

Risk analysis is often viewed as a “black art”—part fortune telling, part mathematics. Successful risk analysis, however,... see more

The security team at C-Bay, an online Real Estate auction company, analyze and respond to an increase in hacking and... see more

Biometrics.gov is the central source of information on biometrics-related activities of the Federal government. This site... see more

An ideology is defined as a set of ideas that “explains and evaluates social conditions, helps people understand their... see more

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical... see more

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket... see more