![]() ![]() Stabilized HMDB51 the number of clips and classes are the same as HMDB51, but there is a mask in videoname.form associated with each clip. Introduction to Linux and shell commands.Īlso see ldap, radius, snort and iptables in Networking. Download Video Database HMDB51 About 2GB for a total of 7,000 clips distributed in 51 action classes. Introduction to managing users and groups and file permissions. Use of the denyhost utility to block brute force attacks on SSH Introduction to passwords and elementary cracking schemes. ![]() System log basic usage and configuration on a CentOS system.ĭata recovery from deleted files within EXT2 and NTFS file systems.įile integrity checking and intrusion detection with AIDE System log basic usage and configuration on an Ubuntu system. Use of Linux capabilites to limit program privileges. Using tar and dump/restore for file backups, including remote backups. And Network Traffic Analysis below.Ĭontrol sharing of information within an SQL database per an information security policy. Use a Radius authentication service to authenticate network devices.Īuthenticate users of Linux servers using an LDAP service.Įxplore the Gateway Border Protocol and configure a BGP router.Įxplore the Open Shortest Path First router protocol and use it to create a spoofed website.Īlso see crypto labs, e.g., ssh, vpn and ssl labs. ![]() Use of snort for network intrusion detection Use of ARP spoofing for Man-in-the-middle attacks.ĭNS spoofing and cache poisoning on a local area network. TCP/IP protocol vulnerabilities, including SYN flooding, RST attacks and session hijacking. The iptables utility is used to configure a “firewall” component to only forward selected application service traffic between a client and a server. The nmap utility is utilized in combination with the tshark network traffic analysis utility to demonstrate a security problem with an ssh server.īasic networking including ARP, ping and an introduction to TCP/IP.Ī simple routing example with two LANs and an internet connection via NATĪn introduction to DNS fuctions and its protocol. The nmap utility is used to locate an ssh server on a network and to discover the port number being used by the service. The student uses telnet to access a remote computer, and employs the tcpdump tool to view plaintext passwords, and to observe how use of ssh mitigates that vulnerability.
0 Comments
Leave a Reply. |