Information security - IV
Offered By: Indian Institute of Technology Madras via Swayam
Course Description
Overview
Short evaluation on scripting, Networking basics (Contents of IS L3) -Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice -Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts -Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices(Switches,Routers, Firewalls) and Proxies
Syllabus
Week 1: Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux
Week 2: Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice
Week 3: Layer 4 discovery using Kali Linux with demo/practice – Port scanning feature in Kali Linux with demo/practice
Week 4: Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice
Week 5: DoS and Web Application Scanning in Kali Linux with Demo/practice - Automating Kali Linux with tools
Week 6: Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows
Week 7: Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool
Week 8: Network Forensics: Network devices (Switches,Routers, Firewalls) and Proxies
Taught by
V. Kamakoti, Shankar Raman and Vasan
Tags
Related Courses
Hacking Laboratuvarınızı OluşturunUdemy Digital Forensics
Uttarakhand Open University, Haldwani via Swayam Digital Forensics Concepts
Infosec via Coursera Enumerating the Network Infrastructure as a Forensics Analyst
Pluralsight Wireshark Configuration for Cyber Security Analysis
Pluralsight