Artwork

Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Network Security

Share
 

Manage series 3066353
Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second part (systems security) discusses topics like scans, intrusions, DOS attacks and firewalls. The last part (lab sessions) will have the students perform practical experiments. Some examples of possible practical experiments are listed below: Remote system fingerprinting (such as possible with tools like nmap); Break anonymization (such as on network traces); Break in into dedicated and prepared web-servers, using tools like Cross-site scripting and SQL injection
  continue reading

5 episodes

Artwork

Network Security

updated

iconShare
 
Manage series 3066353
Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second part (systems security) discusses topics like scans, intrusions, DOS attacks and firewalls. The last part (lab sessions) will have the students perform practical experiments. Some examples of possible practical experiments are listed below: Remote system fingerprinting (such as possible with tools like nmap); Break anonymization (such as on network traces); Break in into dedicated and prepared web-servers, using tools like Cross-site scripting and SQL injection
  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide