Network Security

Overview

    • Participants will learn the fundamental principles of computer & network security by studying attacks on computer systems, network, & the Web.
    • Participants will learn how those attacks work & how to prevent and detect them.
    • The course emphasizes on practical’s & requires participants to conduct a series of lab exercises.
Duration
5 Days

Pre-Requisites
  • A basic understanding of Computer Security
  • Basic understanding Unix/Linux commands

Course Outline

  • Class Introduction (syllabus, policies, and projects)
  • An Overview of Computer Security
  • Course projects (labs)
  • Unix Security Basics
  • Privileged programs (Set-UID programs) and vulnerabilities
  • Buffer Overflow vulnerability and attack
  • Return-to-libc attack
  • Race Condition vulnerability and attack
  • Format String vulnerability and attack
  • Input validation
  • Shellshock attack
    • Same Origin Policy
    • Cross-Site Scripting Attack
    • Cross-Site Request Forgerty Attack
    • SQL-Injection Attack
    • Click-Jacking Attack
    • Web Tracking
    • Web Proxy and Firewall
  • Access control in Android operating system
  • Rooting Android devices
  • Repackaging attacks
  • Attacks on apps
  • Whole-disk encryption
  • Hardware protection: TrustZone
  • Data persistence, use of Core Data
  • Get a grasp of Core Data
  • Store and display of application data on a database managed by Core Data
  • Manage the evolution of data model
  • Use of predicates, Core Data requests language