Toggle navigation
About us
Courses
Contact us
Courses
Computer Science and Engineering
NOC:Information security - IV (Video)
Syllabus
Co-ordinated by :
IIT Madras
Available from :
2017-12-22
Lec :
1
Modules / Lectures
Week 1
WISE Gen and The IT Revolution-1
WISE Gen and The IT Revolution-1 (Contd.)
WISE GEN - Next Step
Network Security : A Re-cap
Symmetric Key Cryptography and Digital Signatures
Basic Network Security Components
Week 2
Internet Security Threats
History of Kali Linux
Penetration Testing with Kali Linux
Network Security and Forensics Introduction - I
Network Security and Forensics Introduction - II
Penetration Testing: An Introduction
Penetration testing steps in Kali Linux
Week 3
Kali Linux Installation
Reconnaissance
Reconnaissance - Part II
Serverside Attacks: Tools in Kali Linux
Serverside Attacks: Tools in Kali Linux (Contd.)
Serverside Attacks: Tools in Kali Linux (Contd.)
Serverside Attacks: Tools in Kali Linux (Contd.)
Week 4
Serverside Attacks: Tools in Kali Linux (Contd .)
Serverside Attacks: Tools in Kali Linux (Contd .)
Client Side Attacks - Tools in Kali Linux - 1
Client Side Attacks - Tools in Kali Linux - 2
Client Side Attacks - Tools in Kali Linux - 3
Client Side Attacks - Tools in Kali Linux - 4
Week 5
Authentication Based Attacks - Tools in Kali Linux - 1
Authentication Based Attacks - Tools in Kali Linux - 2
Authentication Based Attacks - Tools in Kali Linux - 3
Authentication Based Attacks - Tools in Kali Linux - 4
Authentication Based Attacks - Tools in Kali Linux - 5
Web Attacks - Tools in Kali Linux - 1
Web Attacks Tools in Kali Linux - 2
Penetration Testing Attacks - Defensive Countermeasures
Week 6
Technical Fundamentals for Evidence Acquisition - 1
Technical Fundamentals for Evidence Acquisition - 2
Packet Capture Tools and Methods
Wireshark Introduction
Packet Analysis
Flow Analysis
Case study 1
Case study 1 (Continued)
Wireless Forensics - Technology
Week 7
Wireless Network Security Framework
Wireless Access Points - Security issues
Case Study 2 - Use of tools
Network Security Devices - IDS
IDS Evidence Acquistion and SNORT
SNORT Rules
SNORT Installation
SNORT Configuration and Demonstration
Week 8
Evidence collection in Switches and Routers
Evidence collection in Routers and Firewalls
IPTables rules and tool usage
Logs, Rules and Automated Tools
Re-cap of All Topics
Introduction to Meltdown Attack
Introduction to Meltdown - Address Space Basics
Meltdown Attack - Out of Order Execution
Meltdown Attack - Recovering from Exception
Watch on YouTube
Assignments
Transcripts
Books
Assignments
New Assignments
Module Name
Download
W0A1
W0A1
W1A1
W1A1
W2A1
W2A1
W3A1
W3A1
W4A1
W4A1
W5A1
W5A1
W6A1
W6A1
W8A1
W8A1
English
Show
10
25
50
100
entries
Search:
Sl.No
Chapter Name
English
1
WISE Gen and The IT Revolution-1
PDF unavailable
2
WISE Gen and The IT Revolution-1 (Contd.)
PDF unavailable
3
WISE GEN - Next Step
PDF unavailable
4
Network Security : A Re-cap
PDF unavailable
5
Symmetric Key Cryptography and Digital Signatures
PDF unavailable
6
Basic Network Security Components
PDF unavailable
7
Internet Security Threats
PDF unavailable
8
History of Kali Linux
PDF unavailable
9
Penetration Testing with Kali Linux
PDF unavailable
10
Network Security and Forensics Introduction - I
PDF unavailable
Showing 1 to 10 of 60 entries
Previous
1
2
3
4
5
6
Next
Sl.No
Language
Book link
1
English
Not Available
2
Bengali
Not Available
3
Gujarati
Not Available
4
Hindi
Not Available
5
Kannada
Not Available
6
Malayalam
Not Available
7
Marathi
Not Available
8
Tamil
Not Available
9
Telugu
Not Available