top of page

Related Courses

Internet Security A Hands-on Approach Complete 19.5 Hours ( 17 GB) Video Trainin

Price: 6.00 USD | Size: 17 GB | Duration : 19.5 Hours | 104 Video Lessons 

Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works

 

Internet Security A Hands-on Approach Complete 19.5 Hours ( 17 GB) Video Training  Online Course & PDF Guides DOWNLOAD

 

What you'll learn

 

Study classic network attacks and gain in-depth understandings of their technical details

Study how the Internet and the TCP/IP protocols work

Understand the security problems in the design and implementation of the TCP/IP protocols

Master the fundamental attack (ethical hacking) and defense skills in network security

Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor

Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python

 

Requirements

Have basic programming background

Understand basic operating system concepts, such as process, memory, kernel etc.

 

Description

From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.

 

In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.

 

The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.

 

 

Content of this course :

 

1. Course Overview, Lab Setup, and Network Basics

 

 

1. Course Overview (Part I) 

2. Course Overview (Part II) 

3. Lab Exercises and Setup 

4. Network Basics IP Addresses 

5. NAT and Summary hide01.ir @RedBlueHi

 

2. Packet Sniffing and Spoofing

 

 

1. Introduction 

2. Socket Programming and Sending Packets

3. Receiving Packets 

4. Packet Sniffing

5. Sniffing Using PCAP

6. Sniffing Using Scapy 

7. Packet Spoofing

8. Packet Spoofing Using Scapy

9. Scapy v.s. C 

10. Byte Order

11. Summary and Lab Exercise

 

 

3. The MAC Layer and Attacks

 

 

1. Introduction

2. The MAC Layer 

3. The ARP Protocol 

4. ARP Cache Poisoning Attacks 

5. Man-In-The-Middle Attacks Using ARP Cache Poisoning

6. MITM Attack Demo 

7. Question, Countermeasure, and Summary

 

 

4. Network Layer IP, ICMP and Attacks

 

 

1. Introduction

2. The IP Protocol 

3. IP Fragmentation

4. Problem Attacks Using IP Fragmentation

5. Solution Attacks Using IP Fragmentation 

6. Routing

7. Spoofing Prevention on Routers

8. The ICMP Protocol 

9. ICMP Redirect Attack

10. Smurf Attack and Other ICMP Attacks

11. Summary

 

 

5. The UDP Protocol and Attacks

 

 

1. Introduction

2. Transport Layer 

3. The UDP Protocol

4. UDP Attacks 

5. Summary

 

 

6. The TCP Protocol and Attacks

 

 

1. Introduction

2. TCP Overview

3. Send and Receive Buffers

4. Sequence Number, Flow and Congestion Control

5. SYN Flooding Attack 

6. TCP Reset Attack

7. TCP Session Hijacking

8. How Reverse Shell Works

9. Redirecting IO to TCP Connection 

10. Creating Reverse Shell 

11. The Mitnick Attack

12. The Mitnick Attack Demo

13. Countermeasures and Summary

 

 

7. DNS and Attacks

 

 

1. Introduction

2. DNS Zone Hirarchy

3. The DNS Query Process

4. DNS Root Servers

5. Experiment Setup 

6. Constructing DNS Packets

7. Overview of the Attack Surface

8. Local Cache Poisoning Attack

9. The Kaminsky Attack 

10. Demo of the Kaminsky Attack

11. Fake Response Attack

12. DNS Rebinding Attack 

13. Reverse DNS Lookup and Attacks

14. Denial of Service Attacks on DNS

15. Summary

 

 

 

8. Virtual Private Network

 

 

1. Introduction

2. Why VPN, an Analogy, and Tunelling

3. IP Tunneling

4. TUNTAP Virtual Interface 

5. Create TUNTAP Interface (Part 1)

6. Create TUNTAP Interface (Part 2)

7. Going to Private Network 

8. At the VPN Server

9. How Packets Return

10. Review of How VPN Works 

11. A Case Study

12. Bypassing Firewall Using VPN 

13. Summary and Lab Exercises

 

 

9. Firewall

 

 

1. Introduction

2. Netfilter

3. Build a simple firewall

4. Linux Firewall iptables 

5. Use iptables to Build Source NAT 

6. Use iptables to Build Destination NAT 

7. Using iptables' Match and Target Extensions

8. Stateful Firewall and Connection Tracking 

9. Bypassing Firewalls Using SSH and VPN Tunnels 

10. Summary and Lab Exercise 

 

 

10. BGP and Attacks

 

 

1. Introduction 

2. High-Level Picture 

3. Autonomous Systems and Peering

4. How BGP Works

5. Path Selection

6. IBGP and IGP 

7. Overlapping Routes

8. IP Anycast

9. BGP Tools and Utilities

10. BGP Attacks

11. Case Studies of BGP Attacks

12. Summary

 

 

 

11. Heartbleed Attack

 

1. Introduction and the Heartbeat Protocol 

2. How the Attack Works 

3. Lab Exercise.html

Internet Security A Hands-on Approach Complete 19.5 Hours ( 17 GB) Video Trainin

SKU: EXT2021-0246
$6.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page