Network Security
Overview
-
- Participants will learn the fundamental principles of computer & network security by studying attacks on computer systems, network, & the Web.
- Participants will learn how those attacks work & how to prevent and detect them.
- The course emphasizes on practical’s & requires participants to conduct a series of lab exercises.
5 Days
Pre-Requisites
- A basic understanding of Computer Security
- Basic understanding Unix/Linux commands
Course Outline
- Class Introduction (syllabus, policies, and projects)
- An Overview of Computer Security
- Course projects (labs)
- Unix Security Basics
- Privileged programs (Set-UID programs) and vulnerabilities
- Buffer Overflow vulnerability and attack
- Return-to-libc attack
- Race Condition vulnerability and attack
- Format String vulnerability and attack
- Input validation
- Shellshock attack
- Same Origin Policy
- Cross-Site Scripting Attack
- Cross-Site Request Forgerty Attack
- SQL-Injection Attack
- Click-Jacking Attack
- Web Tracking
- Web Proxy and Firewall
- Access control in Android operating system
- Rooting Android devices
- Repackaging attacks
- Attacks on apps
- Whole-disk encryption
- Hardware protection: TrustZone
- Data persistence, use of Core Data
- Get a grasp of Core Data
- Store and display of application data on a database managed by Core Data
- Manage the evolution of data model
- Use of predicates, Core Data requests language
