Course Outline
Course Outline
3) Cryptographic Models
a) Cryptographic Tools
b) Symmetric Encryption vs Asymmetric Encryption
c) Block vs Stream ciphers
d) Message Authentication
e) Hash Functions
f) Public Key vs Private Key
g) Public Key Certificates + Digital Envelopes
h) Random Numbers vs Psuedo Numbers
a) SSL vs TLS
b) HTTP vs HTTPS (HTTP over SSL)
c) IP Sec (Benefits + Scope)
d) Transport and Tunnel Modes
5) Checksums
a) TCP Checksum
b) CRC
6) DoS Attacks
a) DoS?
b) Classic DoS Attacks
c) Spoofing
d) Backscatter Traffic
e) SYN spoofing
f) TCP connection handshake
g) Flood Attacks
h) UDP Packets
i) DDoS Attacks
j) SIP invite scenario
k) HTTP attacks
l) Reflection attacks
m) DNS attacks
n) Amplification attacks
o) Attack Prevention
8) Malware Attacks
a) Malware
b) Malicious Software
c) Types of Malware
d) Anti Virus
e) Digital immune System
f) Behaviour Blocking Software
g) Worms
h) Proactive Worm containment
i) Mobile code
j) Client-side Vulnerabilities
k) Social Engineering, spam and Trojans
l) Payload Attacks and bots (Zombies/Drone) [IMPORTANT]
m) Rootkit
n) Counter Measures
9) Database Security
a) Importance of Data
b) Identity Theft
c) Levels of Data Security
d) Physical/ OS Security
e) Database Encryption
f) SQL Authorization
g) Access Control in Application Layer
h) Oracle Virtual Private Database
i) Privacy
j) Application Security
k) SQL Injection
l) Outside vs Insider Attack
m) Corruptions + Information Leakage
10) NIDS/NIPS
a) Snort3 + Suricata
b) Intruders + Types
c) NIDS and HIDS
d) Anomaly Detection
e) Signature + Heuristic Detection
f) Passive sensors
g) Logging for Alerts
h) HoneyPot
11) Firewall
Resources:
https://learn.saylor.org/course/view.php?id=453§ionid=16633#section-1
Assignment 1:
Assignment 2:
1) Winsock2
2) 3 Clients + 1 Server