Lecture 1 - WISE Gen and The IT Revolution - 1
Lecture 2 - WISE Gen and The IT Revolution - 1 (Continued...)
Lecture 3 - WISE GEN - Next Step
Lecture 4 - Network Security : A Re-cap
Lecture 5 - Symmetric Key Cryptography and Digital Signatures
Lecture 6 - Basic Network Security Components
Lecture 7 - Internet Security Threats
Lecture 8 - History of Kali Linux
Lecture 9 - Penetration Testing with Kali Linux
Lecture 10 - Network Security and Forensics Introduction - I
Lecture 11 - Network Security and Forensics Introduction - II
Lecture 12 - Penetration Testing: An Introduction
Lecture 13 - Penetration testing steps in Kali Linux
Lecture 14 - Kali Linux Installation
Lecture 15 - Reconnaissance - Part I
Lecture 16 - Reconnaissance - Part II
Lecture 17 - Serverside Attacks: Tools in Kali Linux
Lecture 18 - Serverside Attacks: Tools in Kali Linux (Continued...)
Lecture 19 - Serverside Attacks: Tools in Kali Linux (Continued...)
Lecture 20 - Serverside Attacks: Tools in Kali Linux (Continued...)
Lecture 21 - Serverside Attacks: Tools in Kali Linux (Continued...)
Lecture 22 - Serverside Attacks: Tools in Kali Linux (Continued...)
Lecture 23 - Client Side Attacks - Tools in Kali Linux - 1
Lecture 24 - Client Side Attacks - Tools in Kali Linux - 2
Lecture 25 - Client Side Attacks - Tools in Kali Linux - 3
Lecture 26 - Client Side Attacks - Tools in Kali Linux - 4
Lecture 27 - Authentication Based Attacks - Tools in Kali Linux - 1
Lecture 28 - Authentication Based Attacks - Tools in Kali Linux - 2
Lecture 29 - Authentication Based Attacks - Tools in Kali Linux - 3
Lecture 30 - Authentication Based Attacks - Tools in Kali Linux - 4
Lecture 31 - Authentication Based Attacks - Tools in Kali Linux - 5
Lecture 32 - Web Attacks - Tools in Kali Linux - 1
Lecture 33 - Web Attacks - Tools in Kali Linux - 2
Lecture 34 - Penetration Testing Attacks - Defensive Countermeasures
Lecture 35 - Technical Fundamentals for Evidence Acquisition - 1
Lecture 36 - Technical Fundamentals for Evidence Acquisition - 2
Lecture 37 - Packet Capture Tools and Methods
Lecture 38 - Wireshark Introduction
Lecture 39 - Packet Analysis
Lecture 40 - Flow Analysis
Lecture 41 - Case study 1
Lecture 42 - Case study 1 (Continued...)
Lecture 43 - Wireless Forensics - Technology
Lecture 44 - Wireless Network Security Framework
Lecture 45 - Wireless Access Points - Security issues
Lecture 46 - Case Study 2 - Use of tools
Lecture 47 - Network Security Devices - IDS
Lecture 48 - IDS Evidence Acquistion and SNORT
Lecture 49 - SNORT Rules
Lecture 50 - SNORT Installation
Lecture 51 - SNORT Configuration and Demonstration
Lecture 52 - Evidence collection in Switches and Routers
Lecture 53 - Evidence collection in Routers and Firewalls
Lecture 54 - IPTables rules and tool usage
Lecture 55 - Logs, Rules and Automated Tools
Lecture 56 - Re-cap of All Topics
Lecture 57 - Introduction to Meltdown Attack
Lecture 58 - Introduction to Meltdown - Address Space Basics
Lecture 59 - Meltdown Attack - Out of Order Execution
Lecture 60 - Meltdown Attack - Recovering from Exception