Careers360 Logo
ask-icon
share
    Compare

    Quick Facts

    Medium Of InstructionsMode Of LearningMode Of Delivery
    EnglishSelf Study, Virtual ClassroomVideo and Text Based

    Courses and Certificate Fees

    Certificate AvailabilityCertificate Providing Authority
    yesIIT Kanpur

    The Syllabus

    • Introduction
    • Interview with Prof.Sandeep Shukla CSE IIT kanpur
    • What is computer security and what to learn?
    • Learning objectives
    • Sample Attacks
    • The Marketplace for vulnerabilities
    • Error 404 Hacking digital India part 1 chase

    • Control Hijacking
    • More Control Hijacking attacks integer overflow
    • More Control Hijacking attacks format string vulnerabilities
    • Defense against Control Hijacking - Platform Defenses
    • Defense against Control Hijacking - Run-time Defenses
    • Advanced Control Hijacking attacks

    • Confidentiality Policies
    • Confinement Principle
    • Detour Unix user IDs process IDs and privileges
    • More on confinement techniques
    • System call interposition
    • Error 404 digital Hacking in India part 2 chase

    • VM based isolation
    • Confinement principle
    • Software fault isolation
    • Rootkits
    • Intrusion Detection Systems

    • Secure architecture principles isolation and leas
    • Access Control Concepts
    • Are you sure you have never been hacked Sandeep Shukla
    • Unix and windows access control summary
    • Other issues in access control
    • Introduction to browser isolation

    • Web security landscape
    • Web security definitions goals and threat models
    • HTTP content rendering
    • Browser isolation
    • Security interface
    • Cookies frames and frame busting

    • Major web server threats
    • Cross site request forgery
    • Cross site scripting
    • Defenses and protections against XSS
    • Finding vulnerabilities
    • Secure development

    • Basic cryptography
    • Public key cryptography
    • RSA public key crypto
    • Digital signature Hash functions
    • Public key distribution
    • Real world protocols
    • Basic terminologies
    • Email security certificates
    • Transport Layer security TLS
    • IP security
    • DNS security

    • Internet infrastructure
    • Basic security problems
    • Routing security
    • DNS revisited
    • Summary of weaknesses of internet security
    • Link layer connectivity and TCP IP connectivity
    • Packet filtering firewall
    • Intrusion detection
    • Concluding remarks

    Instructors

    Articles

    Student Community: Where Questions Find Answers

    Ask and get expert answers on exams, counselling, admissions, careers, and study options.