Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Network Security

Internet Security: A Hands-on Approach

Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works
Rating: 4.7 out of 54.7 (269 ratings)
1,752 students
Created by Wenliang Du
Last updated 6/2020
English
English
30-Day Money-Back Guarantee

What you'll learn

  • Study classic network attacks and gain in-depth understandings of their technical details
  • Study how the Internet and the TCP/IP protocols work
  • Understand the security problems in the design and implementation of the TCP/IP protocols
  • Master the fundamental attack (ethical hacking) and defense skills in network security
  • Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor
  • Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python

Requirements

  • Have basic programming background
  • Understand basic operating system concepts, such as process, memory, kernel etc.

Description

This course focuses on a variety of attacks on the Internet, It systematically studies each layer of the TCP/IP protocols, discusses the vulnerabilities in its design and implementation, and demonstrates how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details.

The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 130 universities and colleges worldwide.

Who this course is for:

  • Anybody who is interested in ethical hacking
  • Anybody who is interested in learning how the Internet works
  • Anybody who is interested in learning how the Internet can be attacked
  • Students who are interested in learning the theories and practices in the field of network security
  • Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields

Course content

11 sections • 112 lectures • 19h 26m total length

  • Preview13:56
  • Preview11:39
  • Preview07:21
  • Network Basics: IP Addresses
    13:46
  • NAT and Summary
    09:04

  • Introduction
    02:50
  • Socket Programming and Sending Packets
    09:47
  • Receiving Packets
    10:16
  • Packet Sniffing
    12:10
  • Sniffing Using PCAP
    14:15
  • Sniffing Using Scapy
    14:23
  • Packet Spoofing
    18:12
  • Packet Spoofing Using Scapy
    15:55
  • Scapy v.s. C
    15:44
  • Byte Order
    12:49
  • Summary and Lab Exercise
    02:59
  • Lab Exercise
    00:12

  • Introduction
    02:17
  • The MAC Layer
    13:12
  • The ARP Protocol
    16:43
  • ARP Cache Poisoning Attacks
    16:56
  • Preview16:11
  • Preview08:06
  • Question, Countermeasure, and Summary
    05:04
  • Lab Exercise
    00:16

  • Introduction
    04:39
  • The IP Protocol
    17:31
  • IP Fragmentation
    18:58
  • Problem: Attacks Using IP Fragmentation
    05:37
  • Solution: Attacks Using IP Fragmentation
    13:24
  • Routing
    15:50
  • Spoofing Prevention on Routers
    10:16
  • The ICMP Protocol
    10:39
  • ICMP Redirect Attack
    11:42
  • Smurf Attack and Other ICMP Attacks
    09:33
  • Summary
    02:38
  • Lab Exercise
    00:06

  • Introduction
    01:11
  • Transport Layer
    17:02
  • The UDP Protocol
    08:08
  • UDP Attacks
    15:44
  • Summary
    01:45

  • Introduction
    02:55
  • Preview17:43
  • Send and Receive Buffers
    13:47
  • Sequence Number, Flow and Congestion Control
    17:06
  • SYN Flooding Attack
    20:57
  • TCP Reset Attack
    11:07
  • TCP Session Hijacking
    15:19
  • How Reverse Shell Works
    19:29
  • Redirecting IO to TCP Connection
    07:13
  • Creating Reverse Shell
    11:59
  • Preview22:45
  • Preview07:55
  • Countermeasures and Summary
    05:24
  • Lab Exercise
    00:27

  • Introduction
    03:22
  • DNS Zone Hirarchy
    08:44
  • The DNS Query Process
    13:23
  • DNS Root Servers
    09:32
  • Experiment Setup
    20:16
  • Constructing DNS Packets
    13:14
  • Preview06:51
  • Local Cache Poisoning Attack
    16:08
  • The Kaminsky Attack
    21:07
  • Demo of the Kaminsky Attack
    08:46
  • Fake Response Attack
    19:48
  • Preview25:52
  • Reverse DNS Lookup and Attacks
    11:44
  • Denial of Service Attacks on DNS
    09:19
  • Summary
    02:51
  • Lab Exercises
    00:20

  • Introduction
    02:53
  • Preview15:02
  • Preview06:58
  • TUN/TAP Virtual Interface
    11:25
  • Create TUN/TAP Interface (Part 1)
    13:52
  • Create TUN/TAP Interface (Part 2)
    04:49
  • Going to Private Network
    14:37
  • At the VPN Server
    08:38
  • How Packets Return
    15:25
  • Review of How VPN Works
    08:14
  • A Case Study
    10:36
  • Bypassing Firewall Using VPN
    08:34
  • Summary and Lab Exercises
    03:17
  • Lab Exercise
    00:17

  • Introduction
    07:37
  • Netfilter
    07:26
  • Preview13:07
  • Linux Firewall iptables
    16:17
  • Use iptables to Build Source NAT
    10:42
  • Use iptables to Build Destination NAT
    10:34
  • Using iptables' Match and Target Extensions
    08:49
  • Stateful Firewall and Connection Tracking
    12:52
  • Bypassing Firewalls Using SSH and VPN Tunnels
    16:00
  • Summary and Lab Exercise
    03:01
  • Lab Exercise
    00:17

  • Introduction
    04:49
  • High-Level Picture
    08:56
  • Autonomous Systems and Peering
    13:20
  • How BGP Works
    14:26
  • Path Selection
    08:58
  • IBGP and IGP
    06:18
  • Overlapping Routes
    12:37
  • IP Anycast
    10:42
  • BGP Tools and Utilities
    11:04
  • BGP Attacks
    16:47
  • Case Studies of BGP Attacks
    14:00
  • Summary
    02:49

Instructor

Wenliang Du
Professor at Syracuse University
Wenliang Du
  • 4.7 Instructor Rating
  • 571 Reviews
  • 2,475 Students
  • 2 Courses

Dr. Wenliang (Kevin) Du is the Laura J. and L. Douglas Meredith Professor of Teaching Excellence at Syracuse University. He got his PhD degree from Purdue University. He is currently a full professor (tenure track), teaching computer security for almost 20 years. He promotes experiential learning in cybersecurity education. To provide students with hands-on experiences, funded by multiple grants from the National Science Foundation and over a period of 17 years, he has developed over 30 labs (called SEED labs). These labs are now being used by over 1000 universities, colleges, and high schools in 65 countries. He wrote a popular textbook on cybersecurity, which has been adopted by over 130 schools worldwide.

In 2010, his SEED project was highlighted by the National Science Foundation in a report sent to the Congress. The report highlights "17 projects that represent cutting-edge creativity in undergraduate STEM classes nationwide". Due to the impact of the SEED labs, he received the "2017 Academic Leadership" award from the 21st Colloquium for Information System Security Education. In 2019, Syracuse University bestowed upon him the  Meredith Professorship, the university's most prestigious honor for teaching excellence.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.