Information security - IV
Offered By: Indian Institute of Technology Madras via Swayam
Course Description
Overview
Short evaluation on scripting, Networking basics (Contents of IS L3) -Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice -Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts -Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices(Switches,Routers, Firewalls) and Proxies
Syllabus
Week 1: Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux
Week 2: Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice
Week 3: Layer 4 discovery using Kali Linux with demo/practice – Port scanning feature in Kali Linux with demo/practice
Week 4: Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice
Week 5: DoS and Web Application Scanning in Kali Linux with Demo/practice - Automating Kali Linux with tools
Week 6: Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows
Week 7: Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool
Week 8: Network Forensics: Network devices (Switches,Routers, Firewalls) and Proxies
Taught by
V. Kamakoti, Shankar Raman and Vasan
Tags
Related Courses
Network SecurityRochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera Cyber Security
CEC via Swayam Seguridad informática práctica
Universitat de València via Miríadax