Resources

Virtual Machines

Cheat Sheets

Linux:

Lecture Slides

# Topic
1 Welcome & Introduction
2 Networking Recap of COMP 177
3 Penetration Testing: Overview
4 Penetration Testing: Reconnaissance
5 Penetration Testing: Scanning
6 Penetration Testing: Vulnerability Scanning
7 Penetration Testing: Exploitation
8 Penetration Testing: Post-Exploitation
9 NICE Challenge Labs
10 Penetration Testing: Social Engineering
11 Network Security Devices: Firewalls, IDS, Honeypots
12 Penetration Testing: Physical Security
13 Crypto 1: Intro, One-Time Pads, Block Ciphers
14 Crypto 2: Stream Ciphers, Nonce, IVs
15 Crypto 3: Public Key Encryption, Authentication
16 Crypto 4: Cryptographic Libraries
17 Crypto 5: Hashes and Passwords
18 Crypto 6: RNG and Entropy
19 Closing Thoughts
Bonus-01 Bonus Topic: NAT Slipstream Attacks
Bonus-02 Bonus Topic: TCP Middlebox Amplification Attacks

Cryptography