Number | Title | Materials |
---|---|---|
1 | Introduction | slides |
2 | Vulnerabilities | slides |
3 | More Vulnerabilities | slides |
4 | Finishing Vulnerabilities | slides |
5 | Intro to Networks | slides |
6 | Intro to TCP | slides |
7 | Port Scanning | slides |
8 | More Port Scanning | slides |
9 | Worms | slides |
10 | Firewalls, IronStack Guest | slides, guest |
11 | Firewalls, DDOS | slides |
12 | Cornell ITSO Guest | slides |
13 | DDOS, NIDS | slides |
14 | NIDS, evasions | slides |
15 | HTTP, NIDS | slides |
16 | Javascript, Web Attacks | slides |
17 | Web Attacks | slides |
18 | More Web Attacks | slides |
19 | Proxies and XSS | slides |
20 | Finishing Web | slides |
21 | Symmetric Key Encryption | slides |
22 | Public Key Encryption | slides |
23 | Transport Layer Security (TLS) | slides |
24 | Review and Future | slides |
25 | Guest (Threat Intelligence) | slides |