Home » Course Layouts » Free Course Layout Udemy
Information Security IV. Instructors: Prof. V. Kamakoti, Prof. Vasan and Prof. M. J. Shankar Raman. Department of Computer Science and Engineering, IIT Madras.
0
English
English [CC]
- Learn basic syntax that can apply to any language.
- Learn what is a programming language and the basic concepts for beginners.
- Understand what is Javascript in it's truest form.
- Know the basic syntax of Javascript.
- Know some hidden quirks in Javascript.
Description
This course deals with topics in information security attacks. Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice - Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Fingerprinting (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices (Switches, Routers, Firewalls) and Proxies. (from nptel.ac.in)
Course content
- Lecture 01 – WISE Gen and the IT Revolution Unlimited
- Lecture 02 – WISE Gen and the IT Revolution (cont.) Unlimited
- Lecture 03 – WISE GEN – Next Step Unlimited
- Lecture 04 – Network Security: a Recap Unlimited
- Lecture 05 – Symmetric Key Cryptography and Digital Signatures Unlimited
- Lecture 06 – Basic Network Security Components Unlimited
- Lecture 07 – Internet Security Threats Unlimited
- Lecture 08 – History of Kali Linux Unlimited
- Lecture 09 – Penetration Testing with Kali Linux Unlimited
- Lecture 10 – Network Security and Forensics Unlimited
- Lecture 11 – Network Security and Forensics (cont.) Unlimited
- Lecture 12 – Penetration Testing: an Introduction Unlimited
- Lecture 13 – Penetration Testing Steps in Kali Linux Unlimited
- Lecture 14 – Kali Linux Installation Unlimited
- Lecture 15 – Reconnaissance Unlimited
- Lecture 16 – Reconnaissance (cont.) Unlimited
- Lecture 17 – Service Side Attacks: Tools in Kali Linux Unlimited
- Lecture 18 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 19 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 20 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 21 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 22 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 23 – Client Side Attacks: Tools in Kali Linux Unlimited
- Lecture 24 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 25 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 26 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 27 – Authentication Based Attacks: Tools in Kali Linux Unlimited
- Lecture 28 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 29 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 30 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 31 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 32 – Web Attacks: Tools in Kali Linux Unlimited
- Lecture 33 – Web Attacks: Tools in Kali Linux (cont.) Unlimited
- Lecture 34 – Penetrating Testing Attacks: Defensive Countermeasures Unlimited
- Lecture 35 – Technical Fundamentals for Evidence Acquisition Unlimited
- Lecture 36 – Technical Fundamentals for Evidence Acquisition (cont.) Unlimited
- Lecture 37 – Packet Capture Tools and Methods Unlimited
- Lecture 38 – Wireshark Introduction Unlimited
- Lecture 39 – Packet Analysis: Network Security and Forensics Unlimited
- Lecture 40 – Flow Analysis: Network Security and Forensics Unlimited
- Lecture 41 – Case study: Ann’s Bad AIM Unlimited
- Lecture 42 – Case study: Ann’s Bad AIM (cont.) Unlimited
- Lecture 43 – Wireless Forensics – Technology Unlimited
- Lecture 44 – Wireless Network Security Framework Unlimited
- Lecture 45 – Wireless Access Points – Security Issues Unlimited
- Lecture 46 – Case Study: Use of Tools Unlimited
- Lecture 47 – Network Security Devices – IDS Unlimited
- Lecture 48 – IDS Evidence Acquisition and SNORT Unlimited
- Lecture 49 – SNORT Rules Unlimited
- Lecture 50 – SNORT Installation Unlimited
- Lecture 51 – SNORT Configuration and Demonstration Unlimited
- Lecture 52 – Evidence Collection in Switches and Routers Unlimited
- Lecture 53 – Evidence Collection in Routers and Firewalls Unlimited
- Lecture 54 – Iptables, Rules and Tool Usage Unlimited
- Lecture 55 – Logs, Rules and Automated Tools Unlimited
- Lecture 56 – Recap of All Topics Unlimited
- Lecture 57 – Introduction to Meltdown Attack Unlimited
- Lecture 58 – Introduction to Meltdown Attack – Address Space Basics Unlimited
- Lecture 59 – Meltdown Attack – Out-of-order Execution Unlimited
- Lecture 60 – Meltdown Attack – Recovering from Exception Unlimited
N.A
- 5 stars0
- 4 stars0
- 3 stars0
- 2 stars0
- 1 stars0
No Reviews found for this course.