Information security - IV
Offered By: Indian Institute of Technology Madras via Swayam
Course Description
Overview
Short evaluation on scripting, Networking basics (Contents of IS L3) -Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice -Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts -Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices(Switches,Routers, Firewalls) and Proxies
Syllabus
Week 1: Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux
Week 2: Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice
Week 3: Layer 4 discovery using Kali Linux with demo/practice – Port scanning feature in Kali Linux with demo/practice
Week 4: Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice
Week 5: DoS and Web Application Scanning in Kali Linux with Demo/practice - Automating Kali Linux with tools
Week 6: Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows
Week 7: Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool
Week 8: Network Forensics: Network devices (Switches,Routers, Firewalls) and Proxies
Taught by
V. Kamakoti, Shankar Raman and Vasan
Tags
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam