Internet Security: A Hands-on Approach
4.8 (44 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
307 students enrolled

Internet Security: A Hands-on Approach

Network attacks on the ARP, IP, TCP/UDP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works
Highest Rated
4.8 (44 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
309 students enrolled
Created by Wenliang Du
Last updated 4/2020
English
Price: $69.99
30-Day Money-Back Guarantee
This course includes
  • 19.5 hours on-demand video
  • 7 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Study classic network attacks and gain in-depth understandings of their technical details
  • Study how the Internet and the TCP/IP protocols work
  • Understand the security problems in the design and implementation of the TCP/IP protocols
  • Master the fundamental attack (ethical hacking) and defense skills in network security
  • Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor
  • Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python
Requirements
  • Have basic programming background
  • Understand basic operating system concepts, such as process, memory, kernel etc.
Description

This course focuses on a variety of attacks on the Internet, It systematically studies each layer of the TCP/IP protocols, discusses the vulnerabilities in its design and implementation, and demonstrates how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details.

The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 130 universities and colleges worldwide.

Who this course is for:
  • Anybody who is interested in ethical hacking
  • Anybody who is interested in learning how the Internet works
  • Anybody who is interested in learning how the Internet can be attacked
  • Students who are interested in learning the theories and practices in the field of network security
  • Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields
Course content
Expand all 111 lectures 19:25:57
+ Packet Sniffing and Spoofing
12 lectures 02:09:32
Introduction
02:50
Socket Programming and Sending Packets
09:47
Receiving Packets
10:16
Packet Sniffing
12:10
Sniffing Using PCAP
14:15
Sniffing Using Scapy
14:23
Packet Spoofing
18:12
Packet Spoofing Using Scapy
15:55
Scapy v.s. C
15:44
Byte Order
12:49
Summary and Lab Exercise
02:59
Lab Exercise
00:12
+ The MAC Layer and Attacks
8 lectures 01:18:45
Introduction
02:17
The MAC Layer
13:12
The ARP Protocol
16:43
ARP Cache Poisoning Attacks
16:56
Question, Countermeasure, and Summary
05:04
Lab Exercise
00:16
+ Network Layer: IP, ICMP and Attacks
11 lectures 02:00:47
Introduction
04:39
The IP Protocol
17:31
IP Fragmentation
18:58
Problem: Attacks Using IP Fragmentation
05:37
Solution: Attacks Using IP Fragmentation
13:24
Routing
15:50
Spoofing Prevention on Routers
10:16
The ICMP Protocol
10:39
ICMP Redirect Attack
11:42
Smurf Attack and Other ICMP Attacks
09:33
Summary
02:38
+ The UDP Protocol and Attacks
5 lectures 43:50
Introduction
01:11
Transport Layer
17:02
The UDP Protocol
08:08
UDP Attacks
15:44
Summary
01:45
+ The TCP Protocol and Attacks
14 lectures 02:54:06
Introduction
02:55
Send and Receive Buffers
13:47
Sequence Number, Flow and Congestion Control
17:06
SYN Flooding Attack
20:57
TCP Reset Attack
11:07
TCP Session Hijacking
15:19
How Reverse Shell Works
19:29
Redirecting IO to TCP Connection
07:13
Creating Reverse Shell
11:59
Countermeasures and Summary
05:24
Lab Exercise
00:27
+ DNS and Attacks
16 lectures 03:11:17
Introduction
03:22
DNS Zone Hirarchy
08:44
The DNS Query Process
13:23
DNS Root Servers
09:32
Experiment Setup
20:16
Constructing DNS Packets
13:14
Local Cache Poisoning Attack
16:08
The Kaminsky Attack
21:07
Demo of the Kaminsky Attack
08:46
Fake Response Attack
19:48
Reverse DNS Lookup and Attacks
11:44
Denial of Service Attacks on DNS
09:19
Summary
02:51
Lab Exercises
00:20
+ Virtual Private Network
14 lectures 02:04:37
Introduction
02:53
TUN/TAP Virtual Interface
11:25
Create TUN/TAP Interface (Part 1)
13:52
Create TUN/TAP Interface (Part 2)
04:49
Going to Private Network
14:37
At the VPN Server
08:38
How Packets Return
15:25
Review of How VPN Works
08:14
A Case Study
10:36
Bypassing Firewall Using VPN
08:34
Summary and Lab Exercises
03:17
Lab Exercise
00:17
+ Firewall
11 lectures 01:46:42
Introduction
07:37
Netfilter
07:26
Linux Firewall iptables
16:17
Use iptables to Build Source NAT
10:42
Use iptables to Build Destination NAT
10:34
Using iptables' Match and Target Extensions
08:49
Stateful Firewall and Connection Tracking
12:52
Bypassing Firewalls Using SSH and VPN Tunnels
16:00
Summary and Lab Exercise
03:01
Lab Exercise
00:17
+ BGP and Attacks
12 lectures 02:04:46
Introduction
04:49
High-Level Picture
08:56
Autonomous Systems and Peering
13:20
How BGP Works
14:26
Path Selection
08:58
IBGP and IGP
06:18
Overlapping Routes
12:37
IP Anycast
10:42
BGP Tools and Utilities
11:04
BGP Attacks
16:47
Case Studies of BGP Attacks
14:00
Summary
02:49