InfoCoBuild

Information Security IV

Information Security IV. Instructors: Prof. V. Kamakoti, Prof. Vasan and Prof. M. J. Shankar Raman. Department of Computer Science and Engineering, IIT Madras. This course deals with topics in information security attacks. Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice - Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Fingerprinting (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices (Switches, Routers, Firewalls) and Proxies. (from nptel.ac.in)

Lecture 01 - WISE Gen and the IT Revolution


Go to the Course Home or watch other lectures:

Lecture 01 - WISE Gen and the IT Revolution
Lecture 02 - WISE Gen and the IT Revolution (cont.)
Lecture 03 - WISE GEN - Next Step
Lecture 04 - Network Security: a Recap
Lecture 05 - Symmetric Key Cryptography and Digital Signatures
Lecture 06 - Basic Network Security Components
Lecture 07 - Internet Security Threats
Lecture 08 - History of Kali Linux
Lecture 09 - Penetration Testing with Kali Linux
Lecture 10 - Network Security and Forensics
Lecture 11 - Network Security and Forensics (cont.)
Lecture 12 - Penetration Testing: an Introduction
Lecture 13 - Penetration Testing Steps in Kali Linux
Lecture 14 - Kali Linux Installation
Lecture 15 - Reconnaissance
Lecture 16 - Reconnaissance (cont.)
Lecture 17 - Service Side Attacks: Tools in Kali Linux
Lecture 18 - Service Side Attacks: Tools in Kali Linux (cont.)
Lecture 19 - Service Side Attacks: Tools in Kali Linux (cont.)
Lecture 20 - Service Side Attacks: Tools in Kali Linux (cont.)
Lecture 21 - Service Side Attacks: Tools in Kali Linux (cont.)
Lecture 22 - Service Side Attacks: Tools in Kali Linux (cont.)
Lecture 23 - Client Side Attacks: Tools in Kali Linux
Lecture 24 - Client Side Attacks: Tools in Kali Linux (cont.)
Lecture 25 - Client Side Attacks: Tools in Kali Linux (cont.)
Lecture 26 - Client Side Attacks: Tools in Kali Linux (cont.)
Lecture 27 - Authentication Based Attacks: Tools in Kali Linux
Lecture 28 - Authentication Based Attacks: Tools in Kali Linux (cont.)
Lecture 29 - Authentication Based Attacks: Tools in Kali Linux (cont.)
Lecture 30 - Authentication Based Attacks: Tools in Kali Linux (cont.)
Lecture 31 - Authentication Based Attacks: Tools in Kali Linux (cont.)
Lecture 32 - Web Attacks: Tools in Kali Linux
Lecture 33 - Web Attacks: Tools in Kali Linux (cont.)
Lecture 34 - Penetrating Testing Attacks: Defensive Countermeasures
Lecture 35 - Technical Fundamentals for Evidence Acquisition
Lecture 36 - Technical Fundamentals for Evidence Acquisition (cont.)
Lecture 37 - Packet Capture Tools and Methods
Lecture 38 - Wireshark Introduction
Lecture 39 - Packet Analysis: Network Security and Forensics
Lecture 40 - Flow Analysis: Network Security and Forensics
Lecture 41 - Case study: Ann's Bad AIM
Lecture 42 - Case study: Ann's Bad AIM (cont.)
Lecture 43 - Wireless Forensics - Technology
Lecture 44 - Wireless Network Security Framework
Lecture 45 - Wireless Access Points - Security Issues
Lecture 46 - Case Study: Use of Tools
Lecture 47 - Network Security Devices - IDS
Lecture 48 - IDS Evidence Acquisition and SNORT
Lecture 49 - SNORT Rules
Lecture 50 - SNORT Installation
Lecture 51 - SNORT Configuration and Demonstration
Lecture 52 - Evidence Collection in Switches and Routers
Lecture 53 - Evidence Collection in Routers and Firewalls
Lecture 54 - Iptables, Rules and Tool Usage
Lecture 55 - Logs, Rules and Automated Tools
Lecture 56 - Recap of All Topics
Lecture 57 - Introduction to Meltdown Attack
Lecture 58 - Introduction to Meltdown Attack - Address Space Basics
Lecture 59 - Meltdown Attack - Out-of-order Execution
Lecture 60 - Meltdown Attack - Recovering from Exception