NOC:Information Security-IV


Lecture 1 - WISE Gen and The IT Revolution - 1


Lecture 2 - WISE Gen and The IT Revolution - 1 (Continued...)


Lecture 3 - WISE GEN - Next Step


Lecture 4 - Network Security : A Re-cap


Lecture 5 - Symmetric Key Cryptography and Digital Signatures


Lecture 6 - Basic Network Security Components


Lecture 7 - Internet Security Threats


Lecture 8 - History of Kali Linux


Lecture 9 - Penetration Testing with Kali Linux


Lecture 10 - Network Security and Forensics Introduction - I


Lecture 11 - Network Security and Forensics Introduction - II


Lecture 12 - Penetration Testing: An Introduction


Lecture 13 - Penetration testing steps in Kali Linux


Lecture 14 - Kali Linux Installation


Lecture 15 - Reconnaissance - Part I


Lecture 16 - Reconnaissance - Part II


Lecture 17 - Serverside Attacks: Tools in Kali Linux


Lecture 18 - Serverside Attacks: Tools in Kali Linux (Continued...)


Lecture 19 - Serverside Attacks: Tools in Kali Linux (Continued...)


Lecture 20 - Serverside Attacks: Tools in Kali Linux (Continued...)


Lecture 21 - Serverside Attacks: Tools in Kali Linux (Continued...)


Lecture 22 - Serverside Attacks: Tools in Kali Linux (Continued...)


Lecture 23 - Client Side Attacks - Tools in Kali Linux - 1


Lecture 24 - Client Side Attacks - Tools in Kali Linux - 2


Lecture 25 - Client Side Attacks - Tools in Kali Linux - 3


Lecture 26 - Client Side Attacks - Tools in Kali Linux - 4


Lecture 27 - Authentication Based Attacks - Tools in Kali Linux - 1


Lecture 28 - Authentication Based Attacks - Tools in Kali Linux - 2


Lecture 29 - Authentication Based Attacks - Tools in Kali Linux - 3


Lecture 30 - Authentication Based Attacks - Tools in Kali Linux - 4


Lecture 31 - Authentication Based Attacks - Tools in Kali Linux - 5


Lecture 32 - Web Attacks - Tools in Kali Linux - 1


Lecture 33 - Web Attacks - Tools in Kali Linux - 2


Lecture 34 - Penetration Testing Attacks - Defensive Countermeasures


Lecture 35 - Technical Fundamentals for Evidence Acquisition - 1


Lecture 36 - Technical Fundamentals for Evidence Acquisition - 2


Lecture 37 - Packet Capture Tools and Methods


Lecture 38 - Wireshark Introduction


Lecture 39 - Packet Analysis


Lecture 40 - Flow Analysis


Lecture 41 - Case study 1


Lecture 42 - Case study 1 (Continued...)


Lecture 43 - Wireless Forensics - Technology


Lecture 44 - Wireless Network Security Framework


Lecture 45 - Wireless Access Points - Security issues


Lecture 46 - Case Study 2 - Use of tools


Lecture 47 - Network Security Devices - IDS


Lecture 48 - IDS Evidence Acquistion and SNORT


Lecture 49 - SNORT Rules


Lecture 50 - SNORT Installation


Lecture 51 - SNORT Configuration and Demonstration


Lecture 52 - Evidence collection in Switches and Routers


Lecture 53 - Evidence collection in Routers and Firewalls


Lecture 54 - IPTables rules and tool usage


Lecture 55 - Logs, Rules and Automated Tools


Lecture 56 - Re-cap of All Topics


Lecture 57 - Introduction to Meltdown Attack


Lecture 58 - Introduction to Meltdown - Address Space Basics


Lecture 59 - Meltdown Attack - Out of Order Execution


Lecture 60 - Meltdown Attack - Recovering from Exception