• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!


Course Lectures

Page history last edited by Patrick 2 weeks, 6 days ago

CIS4360 Lectures Page


Lectures that are useful for the materials in this course will be posted on this page. In addition to lectures produced for this class, this page also include lectures from other courses.


I strongly suggest you download the video lectures to your computer, that way you can view the video on your host system and have access to it at any time (even when you are offline).  Also, run the video in your host system (Windows, whatever) and have your VM open while I work through the video. Pause the video and duplicate what I've done. Does it work? Great! You're doing it correctly. Doesn't work? You're doing it wrong!  Now have fun!




Link to Lecture Page

Introduction to the Course





  • How to create a virtual machine and install Linux Mint within the 'VM.'  This lecture explains how to install and use VMWare on your host machine. What a COOL thing it is to be able to run multiple operating systems, even multiple NETWORKS on your desktop!

Installing Linux Mint in VMWare

Introduction to Computer and Network Security


Introduction to computer and network security:


  • Why it's important, security problems, types of 'attacks,' CIANA.

Introduction to Computer and Network Security


Risk analysis:


  • Defining assets in a risk analysis, identifying threats and the likelihood of the threats occurring, identifying the consequences of a threat occurring, and vulnerabilities that increase risk.

  • Also covers common safeguards to reduce the impact of threats, securing equipment/data, and incident response (should be included in security policy).

Risk Analysis


Legal aspects of computer security


  • Guest lecturer Prof. Mark Pollit (FBI-retired) discusses laws related to computer and network security.




  • Types of authentication, biometrics, detailed explanation of password hashing, examples of bad password choices, password cracking methods, network access controls, and coverage of password security on Unix and Windows systems.

Access control

  • This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.

Password auditing: 


  • Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.
  Password auditing

Rainbow tables:


  • Extended coverage of rainbow tables and Ophcrack software.
  Password Auditing with Rainbow Tables

Project: Password Policies and Auditing

(due date listed on Falcon Online)


Network Security: Packet Capture Analysis


Review of TCP/IP: (2 videos)


  • TCP/IP fundamentals, the OSI model, TCP vs UDP, application protocols, IP addressing, NAT, and an overview of proxy servers.
  Review of TCP/IP

Network signature analysis:


  • Signature analysis, brief introduction to the Snort IDS, analysis of ICMP packet capture, common TCP/UDP ports, network baselining, the TCP 3-way handshake, and review of TCP flags.
  Identifying Network Signatures from Packet Captures

Network signature analysis example:


  • ARP Spoofing
  ARP Spoofing 


  • A honeypot is a computer security system used to detect, deflect, or, in some manner, counteract attempts at unauthorized use of an information system or computer.  In this video I discuss honeypots and how they are used to defend your network. In particular the technology is useful for identifying and monitoring insider threats, which is the number one threat vector for most networks.
    Project: Network Security-Analyzing Packet Capture



Introduction to Firewalls:


  • An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy.
  • In the readings you will learn about DMZs and proxy servers. 


  Introduction to Firewalls

Firewalls with iptables

  • In this lecture I discuss using iptables

Creating a host-only network in VMWare:


  • Create a network in VMWare for a host-only network (i.e., not connected to the Internet, great for running security and forensics sensitive experiments).
  Creating a host-only network

Firewall Assignment Setup


  • Here I walk you through how to setup your VM for the firewall assignment.

Setup for Firewall Assignment


    Project: Firewall with IPTables

Intrusion Detection 


Introduction to Intrusion Detection:


  • Types of IDS's, overview and usage of the Snort IDS, Snort modes and various run options.
  Introduction to Intrusion Detection

Implementing Intrusion Detection:


Implementing a network security policy using SNORT.


  Implementing Intrusion Detection

Installing and Testing SNORT:


  • Installing and testing SNORT.


  Installing and Testing SNORT IDS

SNORT Rules:


  • How to create SNORT rules based on a security policy.
  Creating SNORT Rules
    Project: Intrusion Detection with SNORT



Introduction to VPNs:

  • Discussion of VPN architectures and uses, encapsulation, encryption, authentication.

Introduction to Cryptography:

  • Explanation of symmetric (single key) and asymmetric (public/private key) encryption, GnuPG (GPG) basics.
  Intro to Crypto

Using GPG:


  • Using GPG to implement cryptographic functions.
  Using GPG
    Project: Encryption (Check Announcement on Falcon Online)


Comments (0)

You don't have permission to comment on this page.