- Видео 32
- Просмотров 861 554
Computer and Network Security
Добавлен 25 июн 2014
Digital Forensics Tool Validation
A demonstration on how to create media for forensic tool validation.
Просмотров: 3 123
Видео
Evaluating and Configuring Biometric Systems
Просмотров 1,9 тыс.8 лет назад
Includes discussion of templates, enrollment, scoring, security issues, and hacks.
Introduction to Biometrics
Просмотров 21 тыс.8 лет назад
I cover authentication, identification, biometrics pros and cons.
Setting up iptables logging
Просмотров 7 тыс.8 лет назад
In this video I demonstrate how to setup logging for iptables.
Introduction to access controls.
Просмотров 50 тыс.8 лет назад
This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.
4360 VPN
Просмотров 9288 лет назад
Introduction to VPNs. Discussion of VPN architectures and uses, encapsulation, encryption, authentication.
Honeypots
Просмотров 49 тыс.9 лет назад
Honeypots are used to detect or deflect attacks against network assets. In this introduction I discuss what honeypots are, how I've used them, and how to set them up.
Wireshark
Просмотров 1,8 тыс.10 лет назад
Overview Brief introduction on how to use the Wireshark protocol analyzer.
Introduction to Firewalls with Iptables (part 1)
Просмотров 4 тыс.10 лет назад
Summary An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy. 19:54 - Windows firewall settings 29:10 - Listing of firewall rules in iptables 30:58 - Viewing incoming packet information in iptables Reference Materials Guide to Network Defe...
Introduction to Firewalls (continued)
Просмотров 2,3 тыс.10 лет назад
Summary An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy. 13:31 - Adding an input rule to iptables 14:55 - Flushing all firewall rules from iptables Reference Materials Guide to Network Defense and Countermeasures - Chapter 9 Additiona...
Introduction to IPTables
Просмотров 109 тыс.10 лет назад
Summary Extensive coverage of iptables and iptables syntax, firewall policies, and attacks: SYN flood & ping flood (smurf attack). 28:13 - nano text editor usage 28:58 - How to install vi (vim) in Ubuntu 29:15 - Review of execute permissions 29:35 - Using vim to edit the firewall rules shell script 36:24 - Review of chmod command 36:53 - netstat command usage 37:11 - How to install vsftpd 37:22...
Setup for Firewall Assignment
Просмотров 74410 лет назад
Summary Information necessary to set up the environment for the firewall assignment. 0:51 - Another netstat example 2:25 - Changing VM networking from host-only to NAT 2:51 - Restarting networking in Ubuntu 4:28 - Searching software packages in Ubuntu 5:03 - Installing the Apache web server in Ubuntu 7:06 - Installing telnetd 9:59 - Creating a new user with the adduser command 11:12 - Changing ...
Introduction to Intrusion Detection
Просмотров 42 тыс.10 лет назад
Summary Types of IDS's, overview and usage of the Snort IDS, Snort modes and various run options. Reference Materials Guide to Network Defense and Countermeasures - Chapter 7, Chapter 8 www.snort.org/docs - Snort Documentation
Using SNORT
Просмотров 118 тыс.10 лет назад
Summary Creating an IDS using SNORT. Reference Materials Guide to Network Defense and Countermeasures - Chapter 7, Chapter 8 www.snort.org/docs - Snort Documentation
Introduction to Information Security
Просмотров 5 тыс.10 лет назад
Introduction to Information Security
Introduction to Dr. Craiger's Courses
Просмотров 63110 лет назад
Introduction to Dr. Craiger's Courses
Hagan famoso a este señor, es un genio y un verdadero maestro. Thanks Dr. Philip Craiger.
De nada. No hay problema amigo.
Lewis William Martin Shirley Clark Carol
tutorial still works till this day! crazy
Ameen 🎉.
i like
Can I publish in my website the public keys?
first to comment
Outstanding Pedagogy!
Access Control - determining the allowed actions on resources - controlling access to resources - Elements comprised of - subjects, objevts, operations - controlling access - setting up permissions and restrictions for different users on access to objects
How is this different from IDS again?
Hi Dr. Craiger, is there any place I can get the proper order of these videos? You have a playlist of 30 videos, and I'm pretty sure this video should be the 1st one but its 18th and there are others that I can tell should have come 1st compared to others. They are great videos, very helpful, thank you for making them!
Bro! You're good! Thank you! I've learned more in 30+ minutes than i have in my "Sec+" training through DHS over the past 5 weeks.
Well done
Hi ! Thanks for the tutorial , I have been trying to listen on the port 1883 . but nothing seems to work , could you please help I want to detect mqtt protocol via snort
Thanks a lot for this explain, you are an excellent teacher
Thank you so much i was struggling to understand how arp works and this helps a lot
Why is the narrator saying "variable" when he's talking about the directory named /var?
8 Years later and still relevant. Thank you for taking the time to put this together.
Thank you for help!!!
Does this work in Kali?
How can I create a rule to detect and drop DOS/DDOS packets?
🙏🙏👈🔔💯
I love you
Good!
Very useful still after so many years. Thanks.
Thank you so much..it's very usefull
well done
hi
sir i can not find vmnet 2 to vmnet 19 in my vmware (i unistall and setup again 4-5 but it same), please help me fix it !!!!
very nice and fun to watch. I laughed a couple of times. :)
Very nice class intro on biometrics
Sir your explanation is really superb. Thank you so much sir
thanks!
Very well put together, and informative..However my only problem is figuring out if my ISP, or my home router will be defined as my server address
This was tutorial was uploaded in 2014 and the solution still works in 2021.
nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
Sadly that FORWARD theme wasn't covered...
Fantastic - you have nailed it - a medium/advanced topic in laymans terms. It's not an easy feat. Thank you!
thanks
finally someone who knows what they are talking about and actually make a video that is worthwhile watching.
Great freaking video dude! Can't thank you enough.
THANK YOU !!!
ruclips.net/video/XZV4J17IRNA_/видео.htmlkaios
m.ruclips.net/user/results?search_query=TimesInternetLtd19+%3A+Standard+RUclips+Channel
ruclips.net/p/PLCVPcf48Ex66MSGrW5qw7r56H-76AOyNN
m.ruclips.net/user/playlist=Igllu_list=PLCVPcf48Ex66MSGrW5qw7r56H-76AOyNN
This was the only informative video I could find. All others kept repeating asymmetric encryption part of PGP, without actually telling how I could use it using GPG
cheers pal, this will be of much help !!
Thanks for good video. actually, deny policies ain't only more secured, it's more compact/fast/(lite for cpu + ram) as well.
fu