Header Ads

Free Information Security & Hacking Tutorials and Courses

Free Information Security & Hacking Tutorials and Courses

1. Hacking Techniques and Intrusion Detection 

Course Objectives:

The course is designed to help students gain a detailed insight into the practical and theoretical aspects of advanced topics in hacking techniques and intrusion detection. It aims to:
1. Understand the approaches used today by computer attackers.
2. Provide an understanding of the phases and techniques for public and open source reconnaissance techniques.
3. Understand the offensive and defensive techniques of computer attacks.
4. Gain solid knowledge in buffer overflow concepts and the ability to exploit, and defend against them.
5. Provide detailed understanding of password cracking techniques.
6. Demonstrate a comprehensive understanding of the different kinds of Denial of Service attacks and how to defend against them.
7. Demonstrate the value of Web App attacks such as: SQL injection, Cross-Site Scripting, and Web Session attacks.
8. Provide hands-on labs addressing scanning, exploiting, and defending systems.

Learning Outcomes:

Upon successful completion of this course, students will be able to:
1. Critically compare, analyze and evaluate the techniques needed to attack specific systems;
2. Demonstrate practical competence in a number of hacking techniques including: social engineering, reconnaissance, scanning, enumeration, exploiting Linux and Windows applications, client side attacks, web application attacks, password attacks, and denial of service attacks;
3. Exhibit a strong foundation in attacking computer and networking systems;
4. Demonstrate that they have the necessary knowledge and skills to pursue careers in industry and/or higher education degree program; and
5. Integrate their knowledge and skills into evolving techniques in information security. 

Class Prerequisites:

1. Basic understanding of networks and network protocols
2. Operating Systems concepts
3. Basic knowledge about programming languages
4. Basic knowledge about information security

Click on this link to get this course : Hacking Techniques and Intrusion Detection

2. Reverse Engineering for Beginners [Book]

Book is avaliable in English , Russian , German , French

The book is also known as RE4B. Written by Dennis Yurichev (yurichev.com).

NOTE : To download this book please follow this steps. 
1. Select language and Navigate to the Bottom of the Page.
2. Click on Download button.


Topics discussed: 

x86/x64, ARM/ARM64, MIPS, Java/JVM.

Topics touched: 

Oracle RDBMS, Itanium, copy-protection dongles, LD_PRELOAD, stack overflow, ELF, win32 PE file format, x86-64, critical sections, syscalls, TLS, position-independent code (PIC), profile-guided optimization, C++ STL, OpenMP, win32 SEH.

Click on this link to get this course :  Reverse Engineering for Beginners

3. Hacking Mobile Devices

Catalog Description

Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal. 

Advisory: CNIT 113 and 123, or equivalent familiarity with hacking computers and operating mobile devices 

Upon successful completion of this course, the student will be able to:

Describe the risks of using mobile devices for common activities such as making phone calls, emailing, and shopping
Explain cellular network functions, attacks, anbd countermeasures for voice calls, voicemail, and SMS
Perform and analyze jailbreaks for iOS devices
Analyze the Android security model and rooting
Recognize types of mobile malware and anti-malware options
Identify Web browser services and attacks on mobile platforms and recommend countermeasures
Configure and defeat locking, remote location and wiping services
Explain common mobile app risks and make intelligent decisions when installing and using them
Evaluate the functions and risks of mobile payment services, such as Google Wallet

Click on this link to get this course :  Hacking Mobile Devices

4. Offensive Network Security

Main Course Objectives
  • How to interact with known network protocols
  • How to dissect known protocols
  • How to reverse unknown network protocols
  • How to fuzz known/unknown network protocols
  • How to passively and actively eavesdrop on networks
  • How to interact with wireless networks
Tools Taught
  • Wireshark/tshark
  • nping/nmap/ncat
  • Scapy
  • Protocol Debugger (PDB) / NetZob
  • Terminal Command line tools
  • Known Protocols Covered
  • Ethernet
  • ARP
  • TCP
  • UDP
  • DHCP
  • HTTP
  • SMTP
  • DNS

Click on this link to get this course : Offensive Network Security

No comments

Powered by Blogger.