[ Log On ]
  • Home
  • Tst
  • Cha
  • Enc
  • Code
  • IP
  • Fun
  • Sub
  • DigF
  • Cis
  • Com
  • Db
  • About
  • Netsim

Lectures

[Back] [Home] This is a site a demo site for associated lectures:

  • Outline
    • 1 Introduction to Security
    • 2 Principles of IDS
    • 3 Principles of Encryption
    • Principles of Software Encryption
    • 4 Principles of Authentication
    • 5 Principles of Network Security
    • Principles of Network Security (Part 2)
    • 6 Principles of Software Security
    • Principles of Software Security Part 2
    • Principles of Software Security Part 3
    • Principles of Wireless Security
    • Principles of Digital Forensics (Part 1)
    • Principles of Digital Forensics (Part 2)
    • - Code/Live Forensics
    • - Small Block Forensics
    • 7 Principles of Risk
    • 8 Principles of Threat Analysis
    • 9 Principles of Network Forensics
    • 10 Principles of Data Hiding and Obfuscation
    • 11 Web Infrastructures
    • 12 Cloud Computing
    • - EC2 S3 Commands
    • - EC2 Tools
    • - Real-life demo of instance creation
    • - EC2 AMI
    • - Creating Linux image demo (Lab 10)
    • 13 Codes and Secrets
    • 14 Malware Analysis
    • 15 Advanced Digital Forensics
    • 16 Advanced Network Forensics
  • Digital Forensics Snippets
    • MP3 File Forensics
    • GIF File Forensics
    • JPEG File Forensics
    • ZIP File Forensics
    • PNG File Forensics
    • RTF File Forensics
    • XLS File Forensics
    • Web Page Network Forensics
  • Network Forensics Snippets
    • Web page
    • Scan
    • Spoof
    • NMAP
    • Hydra Telnet
    • Hydra FTP
    • Hping FIN
    • Hping UDP
    • Hping Syn
    • Google
    • FTP
    • DNS
  • Security Snippets
    • Intro Crypto 1
    • Intro Crypto 2
    • Advanced Crypto
    • One-Time Password
    • Secret Splitting
    • ElGamal
    • Code talkers
    • EX-OR
    • Polybius
    • ASCII, Base-64, and so on
    • DES
    • 3DES
    • Blowfish
    • Blowfish with CBC
    • Bcrypt
    • MD5, SHA-1 and SHA-2
    • SHA-3
    • MD2 and MD4
    • AES/CCM
    • Playfair
  • Digital Investigator
    • Introduction
    • Ethernet, IP and TCP
    • HTTP, FTP and DNS
    • ARP and ICMP
    • SMTP, POP-3 and IMAP
    • SSL and TLS
    • Intro to IDS
    • IDS Detection Examples
    • IDS Detection Examples
    • Intro to Pen Testing
    • Pen Testing: NESSUS
    • Pen Testing: Enumeration/User Accounts
  • IP Snippets
    • IP Classifications
    • IP Host/Network Parts
    • IP Host/Network Addresses
    • IP Subnets
    • IP Browser Details
  • Telecommunciations
    • Introduction
    • Signals
    • Multiplexing
    • Digital Pulses
    • Error Coding
    • Compression
  • VMware Cloud
    • Power CLI
    • Create VM from ISO
    • Installing Vyatta
    • Accessing Napier Cloud
    • Vyatta Firewall for Routing
    • Vyatta Firewall and Protection
  • ASP.NET MVC
    • Integrating Console
    • Combobox with Postback
    • Integrating iframes
    • Actions and Partial Views
    • Windows Azure: Deploying and MVC Project to Azure with SDF database
    • Filling a grid
    • Integrating equations
    • Integrating charts
  • Cipher Challenges
    • Scrambled Alphabet
    • Homophonic Cipher
    • Navajo Cipher
    • Bifid Cipher
    • Straddling Cipher
    • Dvorak Cipher
    • Rot13 Cipher
    • Atbash Cipher
    • Polybius Cipher
    • Bacon Cipher
    • Vigenère Cipher
    • ADFGVX Cipher
    • Morse Cipher
    • Pigpen Cipher
    • Bible Cipher
    • Hex Cipher
    • Rail Cipher
    • Mary's Cipher
    • Cracking a Scrambled Alphabet Cipher
    • Cracking MD5
  • .NET
    • .NET 3.x
    • .NET Remoting
    • - .NET Remoting Tutorial
    • - .NET Remoting Tutorial Part 1
    • - .NET Remoting Tutorial Part 2
    • - .NET Remoting Tutorial Part 3
    • - .NET Remoting Tutorial Part 4
    • .NET Workflow
    • .NET WCF
    • .NET WPF
    • - .NET WPF Tutorial 2 Demo
    • .NET Cardspace
    • MVC Part 1: Actions and PartialViews
    • MVC Part 2: Integrating inframes
    • .NET Spreadsheets to XML
  • Wireless
    • Wireless Antennas
    • Wireless Fundamentals
    • Wireless Radio Wave Fundamentals (HD)
    • Wireless RF
    • Wireless Security
    • Wireless Next Generation
  • Cisco Switching
    • VLANs
    • QoS
    • MLS
    • Avail
    • STP
  • CEH
    • 1: Business Aspects of Pen Testing
    • 2: Technical Foundations of Hacking
    • 3: Footprinting and Scanning
    • 4: Enumeration and System Hacking
    • 5: Linux and Automated Security Assessment Tools
    • 6: Trojans and Backdoors
  • Amazon Cloud
    • AWS (Ubuntu)
    • EC2
    • AWS (AMI)
    • AWS (LAMP)
  • Azure Cloud
    • Setting up Web Service
    • Setting up VM
    • SQL Database integration
    • SQL Database import
    • SDF database integration with Azure
  • SQL
    • SQL 1
    • SQL 2
    • SQL 3
    • SQL 4
  • Others
    • PIX/ASA
    • CCNA (Introduction)
    • Digital Certificates
    • Hping (demo)
    • Hydra (demo)
    • IDS Snort (demo)
    • Nessus (demo)
    • Amazon S3
    • SNMP
    • SSH Testing
    • TCP Dump
    • Tripwire
    • VCentre 5 Demo
    • Security Scan with Nessus
    • Cross-scripting
    • Demo Expired Cert
    • Demo Exporting Cert
    • Demo Browser
  • Threat Analysis
    • Demo of Nessus
    • Cross scripting example
    • SQL examples
    • IDS detecting ping and port scan
    • Snort example using ProfSIMs
    • Hydra vulnerability scanning
    • Hping vulnerability scanning
    • Lab Demo Part 1
    • Lab Demo Part 2
    • Lab Demo Part 3
    • Lab Demo Part 4
  • Eve The Magician
    • Seven Crypto Tricks
    • RSA Crack
    • Tunnel Crack
    • Chosen Cipher
    • Bleichenbacher's attack