Information security - IV
Offered By: Indian Institute of Technology Madras via Swayam
Course Description
Overview
Short evaluation on scripting, Networking basics (Contents of IS L3) -Introduction to Kali Linux - Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice -Layer 4 discovery using Kali Linux with demo/practice - Port scanning feature in Kali Linux with demo/practice - Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice - DoS and Web Application Scanning in Kali Linux with demo/practice - Automating Kali Linux with tools - Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows - Unplugged: Wireless Network Forensics Tools and Scripts -Network Forensics: Intrusion and Detection using Snort tool - Network Forensics: Network devices(Switches,Routers, Firewalls) and Proxies
Syllabus
Week 1: Short evaluation on scripting, Networking basics (Contents of IS L3) - Introduction to Kali Linux
Week 2: Layer 2 and Layer 3 Discovery using Kali Linux with demo/practice
Week 3: Layer 4 discovery using Kali Linux with demo/practice – Port scanning feature in Kali Linux with demo/practice
Week 4: Finger printing (Specific OS details and vulnerabilities) in Kali Linux with demo/practice
Week 5: DoS and Web Application Scanning in Kali Linux with Demo/practice - Automating Kali Linux with tools
Week 6: Network Forensics: An introduction and acquisition of evidence - Analysis and tools of network packets and flows
Week 7: Unplugged: Wireless Network Forensics Tools and Scripts - Network Forensics: Intrusion and Detection using Snort tool
Week 8: Network Forensics: Network devices (Switches,Routers, Firewalls) and Proxies
Taught by
V. Kamakoti, Shankar Raman and Vasan
Tags
Related Courses
Advanced Ethical HackingCity College of San Francisco via California Community Colleges System Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera Intermediate Ethical Hacking Techniques
Packt via Coursera Nmap for Penetration Testing: From Beginner to Advanced
Packt via Coursera