Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Internet Security: A Hands-On Approach

    Posted By: ELK1nG
    Internet Security: A Hands-On Approach

    Internet Security: A Hands-On Approach
    Last updated 6/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 17.14 GB | Duration: 19h 26m

    Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works

    What you'll learn

    Study classic network attacks and gain in-depth understandings of their technical details

    Study how the Internet and the TCP/IP protocols work

    Understand the security problems in the design and implementation of the TCP/IP protocols

    Master the fundamental attack (ethical hacking) and defense skills in network security

    Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor

    Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python

    Requirements

    Have basic programming background

    Understand basic operating system concepts, such as process, memory, kernel etc.

    Description

    From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.

    Overview

    Section 1: Course Overview, Lab Setup, and Network Basics

    Lecture 1 Course Overview (Part I)

    Lecture 2 Course Overview (Part II)

    Lecture 3 Lab Exercises and Setup

    Lecture 4 Network Basics: IP Addresses

    Lecture 5 NAT and Summary

    Section 2: Packet Sniffing and Spoofing

    Lecture 6 Introduction

    Lecture 7 Socket Programming and Sending Packets

    Lecture 8 Receiving Packets

    Lecture 9 Packet Sniffing

    Lecture 10 Sniffing Using PCAP

    Lecture 11 Sniffing Using Scapy

    Lecture 12 Packet Spoofing

    Lecture 13 Packet Spoofing Using Scapy

    Lecture 14 Scapy v.s. C

    Lecture 15 Byte Order

    Lecture 16 Summary and Lab Exercise

    Lecture 17 Lab Exercise

    Section 3: The MAC Layer and Attacks

    Lecture 18 Introduction

    Lecture 19 The MAC Layer

    Lecture 20 The ARP Protocol

    Lecture 21 ARP Cache Poisoning Attacks

    Lecture 22 Man-In-The-Middle Attacks Using ARP Cache Poisoning

    Lecture 23 MITM Attack Demo

    Lecture 24 Question, Countermeasure, and Summary

    Lecture 25 Lab Exercise

    Section 4: Network Layer: IP, ICMP and Attacks

    Lecture 26 Introduction

    Lecture 27 The IP Protocol

    Lecture 28 IP Fragmentation

    Lecture 29 Problem: Attacks Using IP Fragmentation

    Lecture 30 Solution: Attacks Using IP Fragmentation

    Lecture 31 Routing

    Lecture 32 Spoofing Prevention on Routers

    Lecture 33 The ICMP Protocol

    Lecture 34 ICMP Redirect Attack

    Lecture 35 Smurf Attack and Other ICMP Attacks

    Lecture 36 Summary

    Lecture 37 Lab Exercise

    Section 5: The UDP Protocol and Attacks

    Lecture 38 Introduction

    Lecture 39 Transport Layer

    Lecture 40 The UDP Protocol

    Lecture 41 UDP Attacks

    Lecture 42 Summary

    Section 6: The TCP Protocol and Attacks

    Lecture 43 Introduction

    Lecture 44 TCP Overview

    Lecture 45 Send and Receive Buffers

    Lecture 46 Sequence Number, Flow and Congestion Control

    Lecture 47 SYN Flooding Attack

    Lecture 48 TCP Reset Attack

    Lecture 49 TCP Session Hijacking

    Lecture 50 How Reverse Shell Works

    Lecture 51 Redirecting IO to TCP Connection

    Lecture 52 Creating Reverse Shell

    Lecture 53 The Mitnick Attack

    Lecture 54 The Mitnick Attack Demo

    Lecture 55 Countermeasures and Summary

    Lecture 56 Lab Exercise

    Section 7: DNS and Attacks

    Lecture 57 Introduction

    Lecture 58 DNS Zone Hirarchy

    Lecture 59 The DNS Query Process

    Lecture 60 DNS Root Servers

    Lecture 61 Experiment Setup

    Lecture 62 Constructing DNS Packets

    Lecture 63 Overview of the Attack Surface

    Lecture 64 Local Cache Poisoning Attack

    Lecture 65 The Kaminsky Attack

    Lecture 66 Demo of the Kaminsky Attack

    Lecture 67 Fake Response Attack

    Lecture 68 DNS Rebinding Attack

    Lecture 69 Reverse DNS Lookup and Attacks

    Lecture 70 Denial of Service Attacks on DNS

    Lecture 71 Summary

    Lecture 72 Lab Exercises

    Section 8: Virtual Private Network

    Lecture 73 Introduction

    Lecture 74 Why VPN, an Analogy, and Tunelling

    Lecture 75 IP Tunneling

    Lecture 76 TUN/TAP Virtual Interface

    Lecture 77 Create TUN/TAP Interface (Part 1)

    Lecture 78 Create TUN/TAP Interface (Part 2)

    Lecture 79 Going to Private Network

    Lecture 80 At the VPN Server

    Lecture 81 How Packets Return

    Lecture 82 Review of How VPN Works

    Lecture 83 A Case Study

    Lecture 84 Bypassing Firewall Using VPN

    Lecture 85 Summary and Lab Exercises

    Lecture 86 Lab Exercise

    Section 9: Firewall

    Lecture 87 Introduction

    Lecture 88 Netfilter

    Lecture 89 Build a simple firewall

    Lecture 90 Linux Firewall iptables

    Lecture 91 Use iptables to Build Source NAT

    Lecture 92 Use iptables to Build Destination NAT

    Lecture 93 Using iptables' Match and Target Extensions

    Lecture 94 Stateful Firewall and Connection Tracking

    Lecture 95 Bypassing Firewalls Using SSH and VPN Tunnels

    Lecture 96 Summary and Lab Exercise

    Lecture 97 Lab Exercise

    Section 10: BGP and Attacks

    Lecture 98 Introduction

    Lecture 99 High-Level Picture

    Lecture 100 Autonomous Systems and Peering

    Lecture 101 How BGP Works

    Lecture 102 Path Selection

    Lecture 103 IBGP and IGP

    Lecture 104 Overlapping Routes

    Lecture 105 IP Anycast

    Lecture 106 BGP Tools and Utilities

    Lecture 107 BGP Attacks

    Lecture 108 Case Studies of BGP Attacks

    Lecture 109 Summary

    Lecture 110 Lab Exercise (New)

    Section 11: Heartbleed Attack

    Lecture 111 Introduction and the Heartbeat Protocol

    Lecture 112 How the Attack Works

    Lecture 113 Lab Exercise

    Anybody who is interested in ethical hacking,Anybody who is interested in learning how the Internet works,Anybody who is interested in learning how the Internet can be attacked,Students who are interested in learning the theories and practices in the field of network security,Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields