Compare

Quick Facts

Medium Of InstructionsMode Of LearningMode Of Delivery
EnglishSelf Study, Virtual ClassroomVideo and Text Based

Courses and Certificate Fees

Certificate AvailabilityCertificate Providing Authority
yesIIT Kanpur

The Syllabus

  • Introduction
  • Interview with Prof.Sandeep Shukla CSE IIT kanpur
  • What is computer security and what to learn?
  • Learning objectives
  • Sample Attacks
  • The Marketplace for vulnerabilities
  • Error 404 Hacking digital India part 1 chase

  • Control Hijacking
  • More Control Hijacking attacks integer overflow
  • More Control Hijacking attacks format string vulnerabilities
  • Defense against Control Hijacking - Platform Defenses
  • Defense against Control Hijacking - Run-time Defenses
  • Advanced Control Hijacking attacks

  • Confidentiality Policies
  • Confinement Principle
  • Detour Unix user IDs process IDs and privileges
  • More on confinement techniques
  • System call interposition
  • Error 404 digital Hacking in India part 2 chase

  • VM based isolation
  • Confinement principle
  • Software fault isolation
  • Rootkits
  • Intrusion Detection Systems

  • Secure architecture principles isolation and leas
  • Access Control Concepts
  • Are you sure you have never been hacked Sandeep Shukla
  • Unix and windows access control summary
  • Other issues in access control
  • Introduction to browser isolation

  • Web security landscape
  • Web security definitions goals and threat models
  • HTTP content rendering
  • Browser isolation
  • Security interface
  • Cookies frames and frame busting

  • Major web server threats
  • Cross site request forgery
  • Cross site scripting
  • Defenses and protections against XSS
  • Finding vulnerabilities
  • Secure development

  • Basic cryptography
  • Public key cryptography
  • RSA public key crypto
  • Digital signature Hash functions
  • Public key distribution
  • Real world protocols
  • Basic terminologies
  • Email security certificates
  • Transport Layer security TLS
  • IP security
  • DNS security

  • Internet infrastructure
  • Basic security problems
  • Routing security
  • DNS revisited
  • Summary of weaknesses of internet security
  • Link layer connectivity and TCP IP connectivity
  • Packet filtering firewall
  • Intrusion detection
  • Concluding remarks

Instructors

Articles

Student Community: Where Questions Find Answers

Ask and get expert answers on exams, counselling, admissions, careers, and study options.