Internet Security: A Hands-On Approach
Last updated 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 17.14 GB | Duration: 19h 26m
Last updated 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 17.14 GB | Duration: 19h 26m
Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works
What you'll learn
Study classic network attacks and gain in-depth understandings of their technical details
Study how the Internet and the TCP/IP protocols work
Understand the security problems in the design and implementation of the TCP/IP protocols
Master the fundamental attack (ethical hacking) and defense skills in network security
Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor
Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python
Requirements
Have basic programming background
Understand basic operating system concepts, such as process, memory, kernel etc.
Description
From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.
Overview
Section 1: Course Overview, Lab Setup, and Network Basics
Lecture 1 Course Overview (Part I)
Lecture 2 Course Overview (Part II)
Lecture 3 Lab Exercises and Setup
Lecture 4 Network Basics: IP Addresses
Lecture 5 NAT and Summary
Section 2: Packet Sniffing and Spoofing
Lecture 6 Introduction
Lecture 7 Socket Programming and Sending Packets
Lecture 8 Receiving Packets
Lecture 9 Packet Sniffing
Lecture 10 Sniffing Using PCAP
Lecture 11 Sniffing Using Scapy
Lecture 12 Packet Spoofing
Lecture 13 Packet Spoofing Using Scapy
Lecture 14 Scapy v.s. C
Lecture 15 Byte Order
Lecture 16 Summary and Lab Exercise
Lecture 17 Lab Exercise
Section 3: The MAC Layer and Attacks
Lecture 18 Introduction
Lecture 19 The MAC Layer
Lecture 20 The ARP Protocol
Lecture 21 ARP Cache Poisoning Attacks
Lecture 22 Man-In-The-Middle Attacks Using ARP Cache Poisoning
Lecture 23 MITM Attack Demo
Lecture 24 Question, Countermeasure, and Summary
Lecture 25 Lab Exercise
Section 4: Network Layer: IP, ICMP and Attacks
Lecture 26 Introduction
Lecture 27 The IP Protocol
Lecture 28 IP Fragmentation
Lecture 29 Problem: Attacks Using IP Fragmentation
Lecture 30 Solution: Attacks Using IP Fragmentation
Lecture 31 Routing
Lecture 32 Spoofing Prevention on Routers
Lecture 33 The ICMP Protocol
Lecture 34 ICMP Redirect Attack
Lecture 35 Smurf Attack and Other ICMP Attacks
Lecture 36 Summary
Lecture 37 Lab Exercise
Section 5: The UDP Protocol and Attacks
Lecture 38 Introduction
Lecture 39 Transport Layer
Lecture 40 The UDP Protocol
Lecture 41 UDP Attacks
Lecture 42 Summary
Section 6: The TCP Protocol and Attacks
Lecture 43 Introduction
Lecture 44 TCP Overview
Lecture 45 Send and Receive Buffers
Lecture 46 Sequence Number, Flow and Congestion Control
Lecture 47 SYN Flooding Attack
Lecture 48 TCP Reset Attack
Lecture 49 TCP Session Hijacking
Lecture 50 How Reverse Shell Works
Lecture 51 Redirecting IO to TCP Connection
Lecture 52 Creating Reverse Shell
Lecture 53 The Mitnick Attack
Lecture 54 The Mitnick Attack Demo
Lecture 55 Countermeasures and Summary
Lecture 56 Lab Exercise
Section 7: DNS and Attacks
Lecture 57 Introduction
Lecture 58 DNS Zone Hirarchy
Lecture 59 The DNS Query Process
Lecture 60 DNS Root Servers
Lecture 61 Experiment Setup
Lecture 62 Constructing DNS Packets
Lecture 63 Overview of the Attack Surface
Lecture 64 Local Cache Poisoning Attack
Lecture 65 The Kaminsky Attack
Lecture 66 Demo of the Kaminsky Attack
Lecture 67 Fake Response Attack
Lecture 68 DNS Rebinding Attack
Lecture 69 Reverse DNS Lookup and Attacks
Lecture 70 Denial of Service Attacks on DNS
Lecture 71 Summary
Lecture 72 Lab Exercises
Section 8: Virtual Private Network
Lecture 73 Introduction
Lecture 74 Why VPN, an Analogy, and Tunelling
Lecture 75 IP Tunneling
Lecture 76 TUN/TAP Virtual Interface
Lecture 77 Create TUN/TAP Interface (Part 1)
Lecture 78 Create TUN/TAP Interface (Part 2)
Lecture 79 Going to Private Network
Lecture 80 At the VPN Server
Lecture 81 How Packets Return
Lecture 82 Review of How VPN Works
Lecture 83 A Case Study
Lecture 84 Bypassing Firewall Using VPN
Lecture 85 Summary and Lab Exercises
Lecture 86 Lab Exercise
Section 9: Firewall
Lecture 87 Introduction
Lecture 88 Netfilter
Lecture 89 Build a simple firewall
Lecture 90 Linux Firewall iptables
Lecture 91 Use iptables to Build Source NAT
Lecture 92 Use iptables to Build Destination NAT
Lecture 93 Using iptables' Match and Target Extensions
Lecture 94 Stateful Firewall and Connection Tracking
Lecture 95 Bypassing Firewalls Using SSH and VPN Tunnels
Lecture 96 Summary and Lab Exercise
Lecture 97 Lab Exercise
Section 10: BGP and Attacks
Lecture 98 Introduction
Lecture 99 High-Level Picture
Lecture 100 Autonomous Systems and Peering
Lecture 101 How BGP Works
Lecture 102 Path Selection
Lecture 103 IBGP and IGP
Lecture 104 Overlapping Routes
Lecture 105 IP Anycast
Lecture 106 BGP Tools and Utilities
Lecture 107 BGP Attacks
Lecture 108 Case Studies of BGP Attacks
Lecture 109 Summary
Lecture 110 Lab Exercise (New)
Section 11: Heartbleed Attack
Lecture 111 Introduction and the Heartbeat Protocol
Lecture 112 How the Attack Works
Lecture 113 Lab Exercise
Anybody who is interested in ethical hacking,Anybody who is interested in learning how the Internet works,Anybody who is interested in learning how the Internet can be attacked,Students who are interested in learning the theories and practices in the field of network security,Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields