[
Log On
]
Home
Tst
Cha
Enc
Code
IP
Fun
Sub
DigF
Cis
Com
Db
About
Netsim
Lectures
[
Back]
[
Home
] This is a site a demo site for associated lectures:
Outline
1 Introduction to Security
2 Principles of IDS
3 Principles of Encryption
Principles of Software Encryption
4 Principles of Authentication
5 Principles of Network Security
Principles of Network Security (Part 2)
6 Principles of Software Security
Principles of Software Security Part 2
Principles of Software Security Part 3
Principles of Wireless Security
Principles of Digital Forensics (Part 1)
Principles of Digital Forensics (Part 2)
- Code/Live Forensics
- Small Block Forensics
7 Principles of Risk
8 Principles of Threat Analysis
9 Principles of Network Forensics
10 Principles of Data Hiding and Obfuscation
11 Web Infrastructures
12 Cloud Computing
- EC2 S3 Commands
- EC2 Tools
- Real-life demo of instance creation
- EC2 AMI
- Creating Linux image demo (Lab 10)
13 Codes and Secrets
14 Malware Analysis
15 Advanced Digital Forensics
16 Advanced Network Forensics
Digital Forensics Snippets
MP3 File Forensics
GIF File Forensics
JPEG File Forensics
ZIP File Forensics
PNG File Forensics
RTF File Forensics
XLS File Forensics
Web Page Network Forensics
Network Forensics Snippets
Web page
Scan
Spoof
NMAP
Hydra Telnet
Hydra FTP
Hping FIN
Hping UDP
Hping Syn
Google
FTP
DNS
Security Snippets
Intro Crypto 1
Intro Crypto 2
Advanced Crypto
One-Time Password
Secret Splitting
ElGamal
Code talkers
EX-OR
Polybius
ASCII, Base-64, and so on
DES
3DES
Blowfish
Blowfish with CBC
Bcrypt
MD5, SHA-1 and SHA-2
SHA-3
MD2 and MD4
AES/CCM
Playfair
Digital Investigator
Introduction
Ethernet, IP and TCP
HTTP, FTP and DNS
ARP and ICMP
SMTP, POP-3 and IMAP
SSL and TLS
Intro to IDS
IDS Detection Examples
IDS Detection Examples
Intro to Pen Testing
Pen Testing: NESSUS
Pen Testing: Enumeration/User Accounts
IP Snippets
IP Classifications
IP Host/Network Parts
IP Host/Network Addresses
IP Subnets
IP Browser Details
Telecommunciations
Introduction
Signals
Multiplexing
Digital Pulses
Error Coding
Compression
VMware Cloud
Power CLI
Create VM from ISO
Installing Vyatta
Accessing Napier Cloud
Vyatta Firewall for Routing
Vyatta Firewall and Protection
ASP.NET MVC
Integrating Console
Combobox with Postback
Integrating iframes
Actions and Partial Views
Windows Azure: Deploying and MVC Project to Azure with SDF database
Filling a grid
Integrating equations
Integrating charts
Cipher Challenges
Scrambled Alphabet
Homophonic Cipher
Navajo Cipher
Bifid Cipher
Straddling Cipher
Dvorak Cipher
Rot13 Cipher
Atbash Cipher
Polybius Cipher
Bacon Cipher
Vigenère Cipher
ADFGVX Cipher
Morse Cipher
Pigpen Cipher
Bible Cipher
Hex Cipher
Rail Cipher
Mary's Cipher
Cracking a Scrambled Alphabet Cipher
Cracking MD5
.NET
.NET 3.x
.NET Remoting
- .NET Remoting Tutorial
- .NET Remoting Tutorial Part 1
- .NET Remoting Tutorial Part 2
- .NET Remoting Tutorial Part 3
- .NET Remoting Tutorial Part 4
.NET Workflow
.NET WCF
.NET WPF
- .NET WPF Tutorial 2 Demo
.NET Cardspace
MVC Part 1: Actions and PartialViews
MVC Part 2: Integrating inframes
.NET Spreadsheets to XML
Wireless
Wireless Antennas
Wireless Fundamentals
Wireless Radio Wave Fundamentals (HD)
Wireless RF
Wireless Security
Wireless Next Generation
Cisco Switching
VLANs
QoS
MLS
Avail
STP
CEH
1: Business Aspects of Pen Testing
2: Technical Foundations of Hacking
3: Footprinting and Scanning
4: Enumeration and System Hacking
5: Linux and Automated Security Assessment Tools
6: Trojans and Backdoors
Amazon Cloud
AWS (Ubuntu)
EC2
AWS (AMI)
AWS (LAMP)
Azure Cloud
Setting up Web Service
Setting up VM
SQL Database integration
SQL Database import
SDF database integration with Azure
SQL
SQL 1
SQL 2
SQL 3
SQL 4
Others
PIX/ASA
CCNA (Introduction)
Digital Certificates
Hping (demo)
Hydra (demo)
IDS Snort (demo)
Nessus (demo)
Amazon S3
SNMP
SSH Testing
TCP Dump
Tripwire
VCentre 5 Demo
Security Scan with Nessus
Cross-scripting
Demo Expired Cert
Demo Exporting Cert
Demo Browser
Threat Analysis
Demo of Nessus
Cross scripting example
SQL examples
IDS detecting ping and port scan
Snort example using ProfSIMs
Hydra vulnerability scanning
Hping vulnerability scanning
Lab Demo Part 1
Lab Demo Part 2
Lab Demo Part 3
Lab Demo Part 4
Eve The Magician
Seven Crypto Tricks
RSA Crack
Tunnel Crack
Chosen Cipher
Bleichenbacher's attack