![]() Lecture 30 - Authentication Based Attacks: Tools in Kali Linux (cont.) Lecture 29 - Authentication Based Attacks: Tools in Kali Linux (cont.) Lecture 28 - Authentication Based Attacks: Tools in Kali Linux (cont.) Lecture 27 - Authentication Based Attacks: Tools in Kali Linux Lecture 26 - Client Side Attacks: Tools in Kali Linux (cont.) Lecture 25 - Client Side Attacks: Tools in Kali Linux (cont.) Lecture 24 - Client Side Attacks: Tools in Kali Linux (cont.) Lecture 23 - Client Side Attacks: Tools in Kali Linux ![]() Lecture 22 - Service Side Attacks: Tools in Kali Linux (cont.) Lecture 21 - Service Side Attacks: Tools in Kali Linux (cont.) Lecture 20 - Service Side Attacks: Tools in Kali Linux (cont.) Lecture 19 - Service Side Attacks: Tools in Kali Linux (cont.) Lecture 18 - Service Side Attacks: Tools in Kali Linux (cont.) Lecture 17 - Service Side Attacks: Tools in Kali Linux Lecture 13 - Penetration Testing Steps in Kali Linux Lecture 12 - Penetration Testing: an Introduction Lecture 11 - Network Security and Forensics (cont.) Lecture 10 - Network Security and Forensics Lecture 09 - Penetration Testing with Kali Linux ![]() Lecture 06 - Basic Network Security Components Lecture 05 - Symmetric Key Cryptography and Digital Signatures Lecture 02 - WISE Gen and the IT Revolution (cont.) Lecture 01 - WISE Gen and the IT Revolution Go to the Course Home or watch other lectures: Lecture 51 - SNORT Configuration and Demonstration Short evaluation on scripting, Networking basics (Contents of IS 元) - Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice - Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Fingerprinting (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices (Switches, Routers, Firewalls) and Proxies. This course deals with topics in information security attacks. Department of Computer Science and Engineering, IIT Madras.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |