[ Log On ]
  • Home
  • Tst
  • Cha
  • Enc
  • Code
  • IP
  • Fun
  • Sub
  • DigF
  • Cis
  • Com
  • Db
  • About
  • Netsim

Security and Forensic Computing (CSN09105)

The module descriptor is [Here]

Pigpen The content for the units is here:

Test 2 (Lectures)

  • 1. Network Forensics: Ethernet, IP and TCP [Video]
  • 2. Network Forensics: HTTP and DNS [Video]
  • 3. Network Forensics: ARP and ICMP [Video]
  • 4. Network Forensics: SMTP, POP-3, IMAP-4 [Video]
  • 5. Network Forensics: SSL and TLS [Video]
  • 6. File Forensics [Video]
  • 7. Live Forensics [Video][Slides]

Test 2 (Challenges)

  • Network Forensics: [Examples] [Notes][Slides]
  • Network Forensics (Test): [Examples] [Notes][Slides]
  • File Forensics: [Examples] [Slides]
  • Test 2 Study Guide: [Here][Scalpel config: Here]

Coursework

  • Coursework [Specification]
  • Bot [Here]

Test 1

  • 1. Introduction to Security - [ Unit 1] [Notes]
  • 2. Principles of IDS - [ Unit 2: IDS] [Notes]
  • 3. Principles of Encryption [ Unit 3: Encryption] [Notes]
  • 4. Principles of Authentication [ Unit 4: Authentication] [Notes]
  • Test Specification [Here]

Test 1 (Challenges)

  • 1. Hex Code Challenge [ Try].
  • 2. Pigpen [ Try].
  • 3. Polybius [ Try].
  • 4. Morse [ Try].
  • 5. ADFGVX [ Try].
  • 6. Scrambled Alphabet [ Try]. Can you beat 5 minutes?

Test 1 (Examples)

  • Rail Code [ Try].
  • Caeser. Test.
  • Hex. Test.
  • Binary to ASCII. Test.

Stand-alone lectures

  • Introduction to Security [Download standalone version].
  • Principles of IDS [Download standalone version].
  • Principles of Encryption [Download standalone version].
  • Principles of Authentication [Download standalone version].
  • Forensic Computing [Forensic Computing standalone]

Associated Labs (Part 1)

  • PDF. [.NET] Lab 1: Reading from network adaptor. Lab
  • PDF. [.NET] Lab 2: Data packet capture (filtering). Lab.
  • PDF. [.NET] Lab 3: Data packet capture (filters: IP, TCP, and so on). Lab.
  • PDF. [.NET] Lab 4: ARP Detection.
  • PDF. [.NET] Lab 5: Calling Snort. Lab.
  • PDF. [.NET] Lab 6: Using Snort to Detect Attacks. Lab.
  • PDF. [.NET] Lab 7: Private-key Encryption.
  • PDF. [.NET] Lab 8: Public-key Encryption.
  • PDF. [.NET] Lab 9: Log/Events.
  • PDF. [.NET] Lab 10: TCP Forensics.
  • PDF. [.NET] Lab 11: Binary Reader/File Signature Analysis.
  • PDF. [.NET] Lab 12: Role-based security.
  • PDF. Lab: PGP Encryption.

Test 1 Sample

  • Chapters 1-4 Test: Test.
  • Study areas: [Here].
  • Practice test: [Here].
  • Millionaire test: [Here]. Make a million (some of the questions might not appear in the right way - and will overflow the text boxes).