Mô tả

From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.

In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.

The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.

Bạn sẽ học được gì

Yêu cầu

Nội dung khoá học

11 sections

Course Overview, Lab Setup, and Network Basics

5 lectures
Course Overview (Part I)
13:56
Course Overview (Part II)
11:39
Lab Exercises and Setup
07:21
Network Basics: IP Addresses
13:46
NAT and Summary
09:04

Packet Sniffing and Spoofing

12 lectures
Introduction
02:50
Socket Programming and Sending Packets
09:47
Receiving Packets
10:16
Packet Sniffing
12:10
Sniffing Using PCAP
14:15
Sniffing Using Scapy
14:23
Packet Spoofing
18:12
Packet Spoofing Using Scapy
15:55
Scapy v.s. C
15:44
Byte Order
12:49
Summary and Lab Exercise
02:59
Lab Exercise
00:12

The MAC Layer and Attacks

8 lectures
Introduction
02:17
The MAC Layer
13:12
The ARP Protocol
16:43
ARP Cache Poisoning Attacks
16:56
Man-In-The-Middle Attacks Using ARP Cache Poisoning
16:11
MITM Attack Demo
08:06
Question, Countermeasure, and Summary
05:04
Lab Exercise
00:16

Network Layer: IP, ICMP and Attacks

12 lectures
Introduction
04:39
The IP Protocol
17:31
IP Fragmentation
18:58
Problem: Attacks Using IP Fragmentation
05:37
Solution: Attacks Using IP Fragmentation
13:24
Routing
15:50
Spoofing Prevention on Routers
10:16
The ICMP Protocol
10:39
ICMP Redirect Attack
11:42
Smurf Attack and Other ICMP Attacks
09:33
Summary
02:38
Lab Exercise
00:06

The UDP Protocol and Attacks

5 lectures
Introduction
01:11
Transport Layer
17:02
The UDP Protocol
08:08
UDP Attacks
15:44
Summary
01:45

The TCP Protocol and Attacks

14 lectures
Introduction
02:55
TCP Overview
17:43
Send and Receive Buffers
13:47
Sequence Number, Flow and Congestion Control
17:06
SYN Flooding Attack
20:57
TCP Reset Attack
11:07
TCP Session Hijacking
15:19
How Reverse Shell Works
19:29
Redirecting IO to TCP Connection
07:13
Creating Reverse Shell
11:59
The Mitnick Attack
22:45
The Mitnick Attack Demo
07:55
Countermeasures and Summary
05:24
Lab Exercise
00:28

DNS and Attacks

16 lectures
Introduction
03:22
DNS Zone Hirarchy
08:44
The DNS Query Process
13:23
DNS Root Servers
09:32
Experiment Setup
20:16
Constructing DNS Packets
13:14
Overview of the Attack Surface
06:51
Local Cache Poisoning Attack
16:08
The Kaminsky Attack
21:07
Demo of the Kaminsky Attack
08:46
Fake Response Attack
19:48
DNS Rebinding Attack
25:52
Reverse DNS Lookup and Attacks
11:44
Denial of Service Attacks on DNS
09:19
Summary
02:51
Lab Exercises
00:21

Virtual Private Network

14 lectures
Introduction
02:53
Why VPN, an Analogy, and Tunelling
15:02
IP Tunneling
06:58
TUN/TAP Virtual Interface
11:25
Create TUN/TAP Interface (Part 1)
13:52
Create TUN/TAP Interface (Part 2)
04:49
Going to Private Network
14:37
At the VPN Server
08:38
How Packets Return
15:25
Review of How VPN Works
08:14
A Case Study
10:36
Bypassing Firewall Using VPN
08:34
Summary and Lab Exercises
03:17
Lab Exercise
00:08

Firewall

11 lectures
Introduction
07:37
Netfilter
07:26
Build a simple firewall
13:07
Linux Firewall iptables
16:17
Use iptables to Build Source NAT
10:42
Use iptables to Build Destination NAT
10:34
Using iptables' Match and Target Extensions
08:49
Stateful Firewall and Connection Tracking
12:52
Bypassing Firewalls Using SSH and VPN Tunnels
16:00
Summary and Lab Exercise
03:01
Lab Exercise
00:17

BGP and Attacks

13 lectures
Introduction
04:49
High-Level Picture
08:56
Autonomous Systems and Peering
13:20
How BGP Works
14:26
Path Selection
08:58
IBGP and IGP
06:18
Overlapping Routes
12:37
IP Anycast
10:42
BGP Tools and Utilities
11:04
BGP Attacks
16:47
Case Studies of BGP Attacks
14:00
Summary
02:49
Lab Exercise (New)
00:23

Heartbleed Attack

3 lectures
Introduction and the Heartbeat Protocol
04:29
How the Attack Works
11:12
Lab Exercise
00:06

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.