0

(

ratings

)

students

Created by:

Profile Photo

Last updated:

September 25, 2023

Duration:

Unlimited Duration

FREE

This course includes:

Unlimited Duration

Badge on Completion

Certificate of completion

Unlimited Duration

Description

Information Security IV. Instructors: Prof. V. Kamakoti, Prof. Vasan and Prof. M. J. Shankar Raman. Department of Computer Science and Engineering, IIT Madras.

This course deals with topics in information security attacks. Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice - Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Fingerprinting (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices (Switches, Routers, Firewalls) and Proxies. (from nptel.ac.in)

Course Curriculum

  • Lecture 01 – WISE Gen and the IT Revolution Unlimited
  • Lecture 02 – WISE Gen and the IT Revolution (cont.) Unlimited
  • Lecture 03 – WISE GEN – Next Step Unlimited
  • Lecture 04 – Network Security: a Recap Unlimited
  • Lecture 05 – Symmetric Key Cryptography and Digital Signatures Unlimited
  • Lecture 06 – Basic Network Security Components Unlimited
  • Lecture 07 – Internet Security Threats Unlimited
  • Lecture 08 – History of Kali Linux Unlimited
  • Lecture 09 – Penetration Testing with Kali Linux Unlimited
  • Lecture 10 – Network Security and Forensics Unlimited
  • Lecture 11 – Network Security and Forensics (cont.) Unlimited
  • Lecture 12 – Penetration Testing: an Introduction Unlimited
  • Lecture 13 – Penetration Testing Steps in Kali Linux Unlimited
  • Lecture 14 – Kali Linux Installation Unlimited
  • Lecture 15 – Reconnaissance Unlimited
  • Lecture 16 – Reconnaissance (cont.) Unlimited
  • Lecture 17 – Service Side Attacks: Tools in Kali Linux Unlimited
  • Lecture 18 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 19 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 20 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 21 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 22 – Service Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 23 – Client Side Attacks: Tools in Kali Linux Unlimited
  • Lecture 24 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 25 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 26 – Client Side Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 27 – Authentication Based Attacks: Tools in Kali Linux Unlimited
  • Lecture 28 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 29 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 30 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 31 – Authentication Based Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 32 – Web Attacks: Tools in Kali Linux Unlimited
  • Lecture 33 – Web Attacks: Tools in Kali Linux (cont.) Unlimited
  • Lecture 34 – Penetrating Testing Attacks: Defensive Countermeasures Unlimited
  • Lecture 35 – Technical Fundamentals for Evidence Acquisition Unlimited
  • Lecture 36 – Technical Fundamentals for Evidence Acquisition (cont.) Unlimited
  • Lecture 37 – Packet Capture Tools and Methods Unlimited
  • Lecture 38 – Wireshark Introduction Unlimited
  • Lecture 39 – Packet Analysis: Network Security and Forensics Unlimited
  • Lecture 40 – Flow Analysis: Network Security and Forensics Unlimited
  • Lecture 41 – Case study: Ann’s Bad AIM Unlimited
  • Lecture 42 – Case study: Ann’s Bad AIM (cont.) Unlimited
  • Lecture 43 – Wireless Forensics – Technology Unlimited
  • Lecture 44 – Wireless Network Security Framework Unlimited
  • Lecture 45 – Wireless Access Points – Security Issues Unlimited
  • Lecture 46 – Case Study: Use of Tools Unlimited
  • Lecture 47 – Network Security Devices – IDS Unlimited
  • Lecture 48 – IDS Evidence Acquisition and SNORT Unlimited
  • Lecture 49 – SNORT Rules Unlimited
  • Lecture 50 – SNORT Installation Unlimited
  • Lecture 51 – SNORT Configuration and Demonstration Unlimited
  • Lecture 52 – Evidence Collection in Switches and Routers Unlimited
  • Lecture 53 – Evidence Collection in Routers and Firewalls Unlimited
  • Lecture 54 – Iptables, Rules and Tool Usage Unlimited
  • Lecture 55 – Logs, Rules and Automated Tools Unlimited
  • Lecture 56 – Recap of All Topics Unlimited
  • Lecture 57 – Introduction to Meltdown Attack Unlimited
  • Lecture 58 – Introduction to Meltdown Attack – Address Space Basics Unlimited
  • Lecture 59 – Meltdown Attack – Out-of-order Execution Unlimited
  • Lecture 60 – Meltdown Attack – Recovering from Exception Unlimited

About the instructor

5 5

Instructor Rating

6

Reviews

4637

Courses

24154

Students

Profile Photo
OpenCoursa
We are an educational and skills marketplace to accommodate the needs of skills enhancement and free equal education across the globe to the millions. We are bringing courses and trainings every single day for our users. We welcome everyone woth all ages, all background to learn. There is so much available to learn and deliver to the people.