NPTEL : NOC:Information Security-IV (Computer Science and Engineering)

Co-ordinators : Prof.M J Shankar Raman, Prof. V. Kamakoti, Prof.Vasan


Lecture 1 - WISE Gen and The IT Revolution - 1

Lecture 2 - WISE Gen and The IT Revolution - 1 (Continued...)

Lecture 3 - WISE GEN - Next Step

Lecture 4 - Network Security : A Re-cap

Lecture 5 - Symmetric Key Cryptography and Digital Signatures

Lecture 6 - Basic Network Security Components

Lecture 7 - Internet Security Threats

Lecture 8 - History of Kali Linux

Lecture 9 - Penetration Testing with Kali Linux

Lecture 10 - Network Security and Forensics Introduction - I

Lecture 11 - Network Security and Forensics Introduction - II

Lecture 12 - Penetration Testing: An Introduction

Lecture 13 - Penetration testing steps in Kali Linux

Lecture 14 - Kali Linux Installation

Lecture 15 - Reconnaissance - Part I

Lecture 16 - Reconnaissance - Part II

Lecture 17 - Serverside Attacks: Tools in Kali Linux

Lecture 18 - Serverside Attacks: Tools in Kali Linux (Continued...)

Lecture 19 - Serverside Attacks: Tools in Kali Linux (Continued...)

Lecture 20 - Serverside Attacks: Tools in Kali Linux (Continued...)

Lecture 21 - Serverside Attacks: Tools in Kali Linux (Continued...)

Lecture 22 - Serverside Attacks: Tools in Kali Linux (Continued...)

Lecture 23 - Client Side Attacks - Tools in Kali Linux - 1

Lecture 24 - Client Side Attacks - Tools in Kali Linux - 2

Lecture 25 - Client Side Attacks - Tools in Kali Linux - 3

Lecture 26 - Client Side Attacks - Tools in Kali Linux - 4

Lecture 27 - Authentication Based Attacks - Tools in Kali Linux - 1

Lecture 28 - Authentication Based Attacks - Tools in Kali Linux - 2

Lecture 29 - Authentication Based Attacks - Tools in Kali Linux - 3

Lecture 30 - Authentication Based Attacks - Tools in Kali Linux - 4

Lecture 31 - Authentication Based Attacks - Tools in Kali Linux - 5

Lecture 32 - Web Attacks - Tools in Kali Linux - 1

Lecture 33 - Web Attacks - Tools in Kali Linux - 2

Lecture 34 - Penetration Testing Attacks - Defensive Countermeasures

Lecture 35 - Technical Fundamentals for Evidence Acquisition - 1

Lecture 36 - Technical Fundamentals for Evidence Acquisition - 2

Lecture 37 - Packet Capture Tools and Methods

Lecture 38 - Wireshark Introduction

Lecture 39 - Packet Analysis

Lecture 40 - Flow Analysis

Lecture 41 - Case study 1

Lecture 42 - Case study 1 (Continued...)

Lecture 43 - Wireless Forensics - Technology

Lecture 44 - Wireless Network Security Framework

Lecture 45 - Wireless Access Points - Security issues

Lecture 46 - Case Study 2 - Use of tools

Lecture 47 - Network Security Devices - IDS

Lecture 48 - IDS Evidence Acquistion and SNORT

Lecture 49 - SNORT Rules

Lecture 50 - SNORT Installation

Lecture 51 - SNORT Configuration and Demonstration

Lecture 52 - Evidence collection in Switches and Routers

Lecture 53 - Evidence collection in Routers and Firewalls

Lecture 54 - IPTables rules and tool usage

Lecture 55 - Logs, Rules and Automated Tools

Lecture 56 - Re-cap of All Topics

Lecture 57 - Introduction to Meltdown Attack

Lecture 58 - Introduction to Meltdown - Address Space Basics

Lecture 59 - Meltdown Attack - Out of Order Execution

Lecture 60 - Meltdown Attack - Recovering from Exception