• Denial of Service Methodology
  • Deeplocker
  • AI and cybersecurity
  • Rainbow tables and password cracking
  • Blowfish
  • Ransomware
  • XML Bombs and Billion Laughs Attack
  • RTF Malware
  • Software testing as a countermeasure, formal methods
  • Brutal Kangaroo
  • Blockchains and cybersecurity
  • Bug Bounty Programs
  • Interesting cryptography algorithms (blowfish, the serpent, elliptic curve, etc)
  • Application Security testing and penetration testin
  • Meltdown Attack
  • Spectre Attack
  • Race Condition Vulnerability
  • ARP Cache and DNS Poisoning
  • ICMP redirect attack
  • Mitnick Attack
  • Firewalls and Firewall exploitation
  • VPN and VPN Tunneling
  • Morris Worm Attack
  • Cyber terrorism and cyber warfare
  • Heartbleed Attack
  • Clickjacking Attack
  • Transport Layer Security
  • Side-channel attacks
  • PSeudo Random Number Exploitation
  • Mobile Device Security
  • Healthcare Physical Device Security
  • Malware as a Service (MaaS)
  • Cloud Security
  • Quality Assurance of Software for Cybersecurity
  • Malware and Intrusion Detection (come talk to reese 👀)
  • Quantum Computing in cybersecurity
  • SlowLoris DOS attack
  • Kali Linux
  • Heap Overflow
  • Security of Credit Cards
  • NP-C problems in cybersecurity / cryptography
  • Embedded Systems security
  • Programming Language Secure Design