- Denial of Service Methodology
- Deeplocker
- AI and cybersecurity
- Rainbow tables and password cracking
- Blowfish
- Ransomware
- XML Bombs and Billion Laughs Attack
- RTF Malware
- Software testing as a countermeasure, formal methods
- Brutal Kangaroo
- Blockchains and cybersecurity
- Bug Bounty Programs
- Interesting cryptography algorithms (blowfish, the serpent, elliptic curve, etc)
- Application Security testing and penetration testin
- Meltdown Attack
- Spectre Attack
- Race Condition Vulnerability
- ARP Cache and DNS Poisoning
- ICMP redirect attack
- Mitnick Attack
- Firewalls and Firewall exploitation
- VPN and VPN Tunneling
- Morris Worm Attack
- Cyber terrorism and cyber warfare
- Heartbleed Attack
- Clickjacking Attack
- Transport Layer Security
- Side-channel attacks
- PSeudo Random Number Exploitation
- Mobile Device Security
- Healthcare Physical Device Security
- Malware as a Service (MaaS)
- Cloud Security
- Quality Assurance of Software for Cybersecurity
- Malware and Intrusion Detection (come talk to reese 👀)
- Quantum Computing in cybersecurity
- SlowLoris DOS attack
- Kali Linux
- Heap Overflow
- Security of Credit Cards
- NP-C problems in cybersecurity / cryptography
- Embedded Systems security
- Programming Language Secure Design