Lectures that are useful for the materials in this course will be posted on this page. In addition to lectures produced for this class, this page also include lectures from other courses.
I strongly suggest you download the video lectures to your computer, that way you can view the video on your host system and have access to it at any time (even when you are offline). Also, run the video in your host system (Windows, whatever) and have your VM open while I work through the video. Pause the video and duplicate what I've done. Does it work? Great! You're doing it correctly. Doesn't work? You're doing it wrong! Now have fun!
Topics |
|
Link to Lecture Page |
||
Introduction to the Course |
||||
|
|
|
|
|
1 |
|
|||
Introduction to Computer and Network Security |
||||
1 |
Introduction to computer and network security:
|
|||
2 |
Risk analysis:
|
|||
3 |
Legal aspects of computer security
|
Laws | ||
Authentication |
||||
1 |
Authentication:
|
Authentication | ||
2 |
Access control
|
AccessControl | ||
3 |
Password auditing:
|
Password auditing | ||
4 |
Rainbow tables:
|
Password Auditing with Rainbow Tables |
||
Project: Password Policies and Auditing (due date listed on Falcon Online) |
|
|
||
Network Security: Packet Capture Analysis |
||||
1 |
Review of TCP/IP: (2 videos)
|
Review of TCP/IP | ||
2 |
Network signature analysis:
|
Identifying Network Signatures from Packet Captures | ||
3 |
Network signature analysis example:
|
ARP Spoofing | ||
4 |
Honeypots
|
Honeypots | ||
Project: Network Security-Analyzing Packet Capture |
||||
Firewalls |
||||
1 |
Introduction to Firewalls:
|
Introduction to Firewalls | ||
Firewalls with iptables
|
iptables | |||
3 |
Creating a host-only network in VMWare:
|
Creating a host-only network | ||
4 |
Firewall Assignment Setup
|
|
||
Project: Firewall with IPTables |
||||
Intrusion Detection |
||||
1 |
Introduction to Intrusion Detection:
|
Introduction to Intrusion Detection | ||
2 |
Implementing Intrusion Detection:
Implementing a network security policy using SNORT.
|
Implementing Intrusion Detection | ||
3 |
Installing and Testing SNORT:
|
Installing and Testing SNORT IDS |
||
4 |
SNORT Rules:
|
Creating SNORT Rules |
||
Project: Intrusion Detection with SNORT |
||||
VPNs |
||||
1 |
Introduction to VPNs:
|
VPNs | ||
Cryptography | ||||
1 |
Introduction to Cryptography:
|
Intro to Crypto | ||
2 |
Using GPG:
|
Using GPG | ||
Project: Encryption (Check Announcement on Falcon Online) |
||||
|