YoVDO

Information security - IV

Offered By: Indian Institute of Technology Madras via Swayam

Tags

Information Security (InfoSec) Courses Kali Linux Courses Intrusion Detection Courses Port Scanning Courses Network Forensics Courses

Course Description

Overview

Short evaluation on scripting, Networking basics (Contents of IS L3) -Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice -Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts -Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices(Switches,Routers, Firewalls) and Proxies


Syllabus

Week 1: Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux
Week 2: Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice
Week 3: Layer 4 discovery using Kali Linux with demo/practice – Port scanning feature in Kali Linux with demo/practice
Week 4: Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice
Week 5: DoS and Web Application Scanning in Kali Linux with Demo/practice - Automating Kali Linux with tools
Week 6: Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows
Week 7: Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool
Week 8: Network Forensics: Network devices (Switches,Routers, Firewalls) and Proxies


Taught by

V. Kamakoti, Shankar Raman and Vasan

Tags

Related Courses

Network Security
Rochester Institute of Technology via edX
Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Cyber Security
CEC via Swayam
Seguridad informática práctica
Universitat de València via Miríadax