Du Internet Security

Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works

Last updated 2022-01-10 | 4.8

- Study classic network attacks and gain in-depth understandings of their technical details
- Study how the Internet and the TCP/IP protocols work
- Understand the security problems in the design and implementation of the TCP/IP protocols

What you'll learn

Study classic network attacks and gain in-depth understandings of their technical details
Study how the Internet and the TCP/IP protocols work
Understand the security problems in the design and implementation of the TCP/IP protocols
Master the fundamental attack (ethical hacking) and defense skills in network security
Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor
Implement Firewall
VPN
sniffer
spoofing
and various network security tools using C or Python

* Requirements

* Have basic programming background
* Understand basic operating system concepts
* such as process
* memory
* kernel etc.

Description

From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.

In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.

The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.

Who this course is for:

  • Anybody who is interested in ethical hacking
  • Anybody who is interested in learning how the Internet works
  • Anybody who is interested in learning how the Internet can be attacked
  • Students who are interested in learning the theories and practices in the field of network security
  • Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields

Course content

11 sections • 113 lectures

Course Overview (Part I) Preview 13:56

Course Overview (Part II) Preview 11:39

Lab Exercises and Setup Preview 07:21

Network Basics: IP Addresses Preview 13:46

NAT and Summary Preview 09:04

Introduction Preview 02:50

Socket Programming and Sending Packets Preview 09:47

Receiving Packets Preview 10:16

Packet Sniffing Preview 12:10

Sniffing Using PCAP Preview 14:15

Sniffing Using Scapy Preview 14:23

Packet Spoofing Preview 18:12

Packet Spoofing Using Scapy Preview 15:55

Scapy v.s. C Preview 15:44

Byte Order Preview 12:49

Summary and Lab Exercise Preview 02:59

Lab Exercise Preview 00:12

Introduction Preview 02:17

The MAC Layer Preview 13:12

The ARP Protocol Preview 16:43

ARP Cache Poisoning Attacks Preview 16:56

Man-In-The-Middle Attacks Using ARP Cache Poisoning Preview 16:11

MITM Attack Demo Preview 08:06

Question, Countermeasure, and Summary Preview 05:04

Lab Exercise Preview 00:16

Introduction Preview 04:39

The IP Protocol Preview 17:31

IP Fragmentation Preview 18:58

Problem: Attacks Using IP Fragmentation Preview 05:37

Solution: Attacks Using IP Fragmentation Preview 13:24

Routing Preview 15:50

Spoofing Prevention on Routers Preview 10:16

The ICMP Protocol Preview 10:39

ICMP Redirect Attack Preview 11:42

Smurf Attack and Other ICMP Attacks Preview 09:33

Summary Preview 02:38

Lab Exercise Preview 00:06

Introduction Preview 02:55

TCP Overview Preview 17:43

Send and Receive Buffers Preview 13:47

Sequence Number, Flow and Congestion Control Preview 17:06

SYN Flooding Attack Preview 20:57

TCP Reset Attack Preview 11:07

TCP Session Hijacking Preview 15:19

How Reverse Shell Works Preview 19:29

Redirecting IO to TCP Connection Preview 07:13

Creating Reverse Shell Preview 11:59

The Mitnick Attack Preview 22:45

The Mitnick Attack Demo Preview 07:55

Countermeasures and Summary Preview 05:24

Lab Exercise Preview 00:27

Introduction Preview 03:22

DNS Zone Hirarchy Preview 08:44

The DNS Query Process Preview 13:23

DNS Root Servers Preview 09:32

Experiment Setup Preview 20:16

Constructing DNS Packets Preview 13:14

Overview of the Attack Surface Preview 06:51

Local Cache Poisoning Attack Preview 16:08

The Kaminsky Attack Preview 21:07

Demo of the Kaminsky Attack Preview 08:46

Fake Response Attack Preview 19:48

DNS Rebinding Attack Preview 25:52

Reverse DNS Lookup and Attacks Preview 11:44

Denial of Service Attacks on DNS Preview 09:19

Summary Preview 02:51

Lab Exercises Preview 00:20

Introduction Preview 02:53

Why VPN, an Analogy, and Tunelling Preview 15:02

IP Tunneling Preview 06:58

TUN/TAP Virtual Interface Preview 11:25

Create TUN/TAP Interface (Part 1) Preview 13:52

Create TUN/TAP Interface (Part 2) Preview 04:49

Going to Private Network Preview 14:37

At the VPN Server Preview 08:38

How Packets Return Preview 15:25

Review of How VPN Works Preview 08:14

A Case Study Preview 10:36

Bypassing Firewall Using VPN Preview 08:34

Summary and Lab Exercises Preview 03:17

Lab Exercise Preview 00:17

Introduction Preview 07:37

Netfilter Preview 07:26

Build a simple firewall Preview 13:07

Linux Firewall iptables Preview 16:17

Use iptables to Build Source NAT Preview 10:42

Use iptables to Build Destination NAT Preview 10:34

Using iptables' Match and Target Extensions Preview 08:49

Stateful Firewall and Connection Tracking Preview 12:52

Bypassing Firewalls Using SSH and VPN Tunnels Preview 16:00

Summary and Lab Exercise Preview 03:01

Lab Exercise Preview 00:17

Introduction Preview 04:49

High-Level Picture Preview 08:56

Autonomous Systems and Peering Preview 13:20

How BGP Works Preview 14:26

Path Selection Preview 08:58

IBGP and IGP Preview 06:18

Overlapping Routes Preview 12:37

IP Anycast Preview 10:42

BGP Tools and Utilities Preview 11:04

BGP Attacks Preview 16:47

Case Studies of BGP Attacks Preview 14:00

Summary Preview 02:49

Lab Exercise (New) Preview 00:23

Introduction and the Heartbeat Protocol Preview 04:29

How the Attack Works Preview 11:12

Lab Exercise Preview 00:06