Modules / Lectures


New Assignments
Module NameDownload
W0A1W0A1
W1A1W1A1
W2A1W2A1
W3A1W3A1
W4A1W4A1
W5A1W5A1
W6A1W6A1
W8A1W8A1

Sl.No Chapter Name English
1WISE Gen and The IT Revolution-1PDF unavailable
2WISE Gen and The IT Revolution-1 (Contd.)PDF unavailable
3WISE GEN - Next StepPDF unavailable
4Network Security : A Re-capPDF unavailable
5Symmetric Key Cryptography and Digital SignaturesPDF unavailable
6Basic Network Security ComponentsPDF unavailable
7Internet Security ThreatsPDF unavailable
8History of Kali LinuxPDF unavailable
9Penetration Testing with Kali LinuxPDF unavailable
10Network Security and Forensics Introduction - IPDF unavailable
11Network Security and Forensics Introduction - IIPDF unavailable
12Penetration Testing: An IntroductionPDF unavailable
13Penetration testing steps in Kali LinuxPDF unavailable
14Kali Linux InstallationPDF unavailable
15ReconnaissancePDF unavailable
16Reconnaissance - Part IIPDF unavailable
17Serverside Attacks: Tools in Kali LinuxPDF unavailable
18Serverside Attacks: Tools in Kali Linux (Contd.)PDF unavailable
19Serverside Attacks: Tools in Kali Linux (Contd.)PDF unavailable
20Serverside Attacks: Tools in Kali Linux (Contd.)PDF unavailable
21Serverside Attacks: Tools in Kali Linux (Contd .)PDF unavailable
22Serverside Attacks: Tools in Kali Linux (Contd .)PDF unavailable
23Client Side Attacks - Tools in Kali Linux - 1PDF unavailable
24Client Side Attacks - Tools in Kali Linux - 2PDF unavailable
25Client Side Attacks - Tools in Kali Linux - 3PDF unavailable
26Client Side Attacks - Tools in Kali Linux - 4PDF unavailable
27Authentication Based Attacks - Tools in Kali Linux - 1PDF unavailable
28Authentication Based Attacks - Tools in Kali Linux - 2PDF unavailable
29Authentication Based Attacks - Tools in Kali Linux - 3PDF unavailable
30Authentication Based Attacks - Tools in Kali Linux - 4PDF unavailable
31Authentication Based Attacks - Tools in Kali Linux - 5PDF unavailable
32Web Attacks - Tools in Kali Linux - 1PDF unavailable
33Web Attacks Tools in Kali Linux - 2PDF unavailable
34Penetration Testing Attacks - Defensive CountermeasuresPDF unavailable
35Technical Fundamentals for Evidence Acquisition - 1PDF unavailable
36Technical Fundamentals for Evidence Acquisition - 2PDF unavailable
37Packet Capture Tools and MethodsPDF unavailable
38Wireshark IntroductionPDF unavailable
39Packet AnalysisPDF unavailable
40Flow AnalysisPDF unavailable
41Case study 1 PDF unavailable
42Case study 1 (Continued)PDF unavailable
43Wireless Forensics - TechnologyPDF unavailable
44Wireless Network Security FrameworkPDF unavailable
45Wireless Access Points - Security issues PDF unavailable
46Case Study 2 - Use of toolsPDF unavailable
47Network Security Devices - IDSPDF unavailable
48IDS Evidence Acquistion and SNORTPDF unavailable
49SNORT Rules PDF unavailable
50SNORT Installation PDF unavailable
51SNORT Configuration and DemonstrationPDF unavailable
52Evidence collection in Switches and RoutersPDF unavailable
53Evidence collection in Routers and FirewallsPDF unavailable
54IPTables rules and tool usagePDF unavailable
55Logs, Rules and Automated Tools PDF unavailable
56Re-cap of All TopicsPDF unavailable
57Introduction to Meltdown AttackPDF unavailable
58Introduction to Meltdown - Address Space BasicsPDF unavailable
59Meltdown Attack - Out of Order ExecutionPDF unavailable
60Meltdown Attack - Recovering from ExceptionPDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available