1 | WISE Gen and The IT Revolution-1 | PDF unavailable |
2 | WISE Gen and The IT Revolution-1 (Contd.) | PDF unavailable |
3 | WISE GEN - Next Step | PDF unavailable |
4 | Network Security : A Re-cap | PDF unavailable |
5 | Symmetric Key Cryptography and Digital Signatures | PDF unavailable |
6 | Basic Network Security Components | PDF unavailable |
7 | Internet Security Threats | PDF unavailable |
8 | History of Kali Linux | PDF unavailable |
9 | Penetration Testing with Kali Linux | PDF unavailable |
10 | Network Security and Forensics Introduction - I | PDF unavailable |
11 | Network Security and Forensics Introduction - II | PDF unavailable |
12 | Penetration Testing: An Introduction | PDF unavailable |
13 | Penetration testing steps in Kali Linux | PDF unavailable |
14 | Kali Linux Installation | PDF unavailable |
15 | Reconnaissance | PDF unavailable |
16 | Reconnaissance - Part II | PDF unavailable |
17 | Serverside Attacks: Tools in Kali Linux | PDF unavailable |
18 | Serverside Attacks: Tools in Kali Linux (Contd.) | PDF unavailable |
19 | Serverside Attacks: Tools in Kali Linux (Contd.) | PDF unavailable |
20 | Serverside Attacks: Tools in Kali Linux (Contd.) | PDF unavailable |
21 | Serverside Attacks: Tools in Kali Linux (Contd .) | PDF unavailable |
22 | Serverside Attacks: Tools in Kali Linux (Contd .) | PDF unavailable |
23 | Client Side Attacks - Tools in Kali Linux - 1 | PDF unavailable |
24 | Client Side Attacks - Tools in Kali Linux - 2 | PDF unavailable |
25 | Client Side Attacks - Tools in Kali Linux - 3 | PDF unavailable |
26 | Client Side Attacks - Tools in Kali Linux - 4 | PDF unavailable |
27 | Authentication Based Attacks - Tools in Kali Linux - 1 | PDF unavailable |
28 | Authentication Based Attacks - Tools in Kali Linux - 2 | PDF unavailable |
29 | Authentication Based Attacks - Tools in Kali Linux - 3 | PDF unavailable |
30 | Authentication Based Attacks - Tools in Kali Linux - 4 | PDF unavailable |
31 | Authentication Based Attacks - Tools in Kali Linux - 5 | PDF unavailable |
32 | Web Attacks - Tools in Kali Linux - 1 | PDF unavailable |
33 | Web Attacks Tools in Kali Linux - 2 | PDF unavailable |
34 | Penetration Testing Attacks - Defensive Countermeasures | PDF unavailable |
35 | Technical Fundamentals for Evidence Acquisition - 1 | PDF unavailable |
36 | Technical Fundamentals for Evidence Acquisition - 2 | PDF unavailable |
37 | Packet Capture Tools and Methods | PDF unavailable |
38 | Wireshark Introduction | PDF unavailable |
39 | Packet Analysis | PDF unavailable |
40 | Flow Analysis | PDF unavailable |
41 | Case study 1 | PDF unavailable |
42 | Case study 1 (Continued) | PDF unavailable |
43 | Wireless Forensics - Technology | PDF unavailable |
44 | Wireless Network Security Framework | PDF unavailable |
45 | Wireless Access Points - Security issues | PDF unavailable |
46 | Case Study 2 - Use of tools | PDF unavailable |
47 | Network Security Devices - IDS | PDF unavailable |
48 | IDS Evidence Acquistion and SNORT | PDF unavailable |
49 | SNORT Rules | PDF unavailable |
50 | SNORT Installation | PDF unavailable |
51 | SNORT Configuration and Demonstration | PDF unavailable |
52 | Evidence collection in Switches and Routers | PDF unavailable |
53 | Evidence collection in Routers and Firewalls | PDF unavailable |
54 | IPTables rules and tool usage | PDF unavailable |
55 | Logs, Rules and Automated Tools | PDF unavailable |
56 | Re-cap of All Topics | PDF unavailable |
57 | Introduction to Meltdown Attack | PDF unavailable |
58 | Introduction to Meltdown - Address Space Basics | PDF unavailable |
59 | Meltdown Attack - Out of Order Execution | PDF unavailable |
60 | Meltdown Attack - Recovering from Exception | PDF unavailable |