Number | Title | Materials |
---|---|---|
1 | Introduction | slides |
2 | Vulnerabilities | slides |
3 | More Vulnerabilities | slides |
4 | Exploit Defenses | slides |
5 | Intro to Networking | slides |
6 | TCP | slides |
7 | Portscanning | slides |
Guest | Software Defined Networking | slides |
8 | Portscanning and Worms | slides |
9 | Worms and Firewalls | slides |
10 | Firewalls and DDOS | slides |
11 | DDOS and NIDS | slides |
12 | NIDS | slides |
13 | NIDS and HTTP | slides |
Guest | IT Security @ Cornell | slides |
14 | More HTTP and NIDS | slides |
15 | Web Attacks | slides |
16 | Web Client Attacks | slides |
17 | Web Client Attacks and Proxies | slides |
18 | Web Application Attacks | slides |
19 | Finishing Web, Symmetric Cryptography | slides |
20 | Symmetric and Public Key Cryptography | slides |
21 | TLS | slides |