Resources

Virtual Machines

Cheat Sheets

Lecture Slides

# Topic
0 Networking Recap of COMP 177
1 Welcome & Introduction
2 Penetration Testing: Overview
3 Penetration Testing: Reconnaissance
4 Penetration Testing: Scanning
5 Penetration Testing: Vulnerability Scanning
6 Penetration Testing: Exploitation
7 Penetration Testing: Post-Exploitation
8 NICE Challenge Labs
9 Penetration Testing: Social Engineering
10 Network Security Devices: Firewalls, IDS, Honeypots
11 Penetration Testing: Physical Security
12 Crypto 1: Intro, One-Time Pads, Block Ciphers
13 Crypto 2: Stream Ciphers, Nonce, IVs
14 Crypto 3: Public Key Encryption, Authentication
15 Crypto 4: Cryptographic Libraries
16 Crypto 5: Hashes and Passwords
17 Crypto 6: RNG and Entropy
Bonus-01 Bonus Topic: NAT Slipstreaming

Cryptography