CPSC 6128 - Network Security Notes
Notes in PowerPoint
With Audio (requires PowerPoint viewer)
Chapter 1 - A Framework
Chapter 1 - Empiral Data (8 minutes)
Chapter 1 - Attack Trends (11 minutes)
Chapter 1 - Attacks and Defenses (6 minutes)
Chapter 1 - Attacks and Defenses diagrams (5 minutes)
Chapter 1 - Security Management (10 minutes)
Chapter 2 - Access Control and Site Security
Chapter 2 - Access Control (6 minutes)
Chapter 15 - Access Control Mechanisms
Chapter 15 - 8 minutes
Chapter 2 - Password Cracking (15 minutes)
File Protection Mechanisms and Paswords with narration
Chapter 2 - Building Security (4 minutes)
Chapter 2 - Biometric Authentication (15 minutes)
Chapter 2 - Wireless Network Security (14 minutes)
Chapter 3 - Review of TCP/IP Internetworking
Chapter 3 - The Internet (4 minutes)
Chapter 3 - TCP/IP Standards (10 minutes)
Chapter 3 - IP Packets (7 minutes)
Chapter 3 - More on IP & Addresses (10 minutes)
Chapter 3 - IP Security Exploits (9 minutes)
Chapter 3 - TCP (10 minutes)
Chapter 3 - TCP port numbers (3 minutes)
Chapter 3 - ICMP (5 minutes)
SECURITY NOW Podcasts:
How the Internet Works, Part 1
How the Internet Works, Part 2
How Local Area Networks Work, Part 1
Ethernet Insecurity
Chapter 4 - Attack Methods
Chapter 4 - Information Collection (5 minutes)
Chapter 4 - Breakin Attacks (8 minutes)
Chapter 4 - DoS Attacks (6 minutes)
Chapter 4 - Malware (18 minutes)
Chapter 5 - Firewalls
Chapter 5 - Types of Firewalls (5 minutes)
Chapter 5 - Firewall Hardware and Software (5 minutes)
Chapter 5 - Static Packet Inspection (6 minutes)
Chapter 5 - Stateful Packet Inspection (4 minutes)
Chapter 5 - NAT, Application Firewalls, Firewall Architecture (5 minutes)
Chapter 5 - Configuring, Testing, and Maintaining Firewalls (5 minutes)
Chapter 6 - Host Security
Chapter 6 - Hardening Host Computers (9 minutes)
Chapter 6 - Installation and Patching (10 minutes)
Chapter 6 - Turning Off Unnecessary Services (7 minutes)
Chapter 6 - Managing Users and Groups (6 minutes)
Chapter 6 - Managing Permissions (8 minutes)
Chapter 6 - Event Logs, Backup, File Encryption, Hardening Clients (10 minutes)
Chapter 7 - Elements of Cryptography
Terminology and Background with narration
Properties of Encryption Algorithms & Cryptanalysis with narration
Algorithms and Uses of Encryption with narration
Key Management - 10 minutes
PKI with narration
Encryption animation
SECURITY NOW Podcasts:
Cryptographic Issues
Symmetric Stream Ciphers
Symmetric Block Ciphers
Chapter 8 - Cryptographic Systems
Kerberos with narration
SSL with narration
(5 min)
IPSEC with narration
Chapter 11 - 6 minutes
VPNs
New Information on SSL/TLS VPNs
SECURITY NOW Podcasts:
Virtual Private Networks (VPN): Theory
VPN Secure Tunneling Solutions
PPTP and IPSec VPN Technology
"Hamachi" Rocks!
VPNs Three: Hamachi, iPig, and OpenVPN
Chapter 9 - Application Security
Chapter 9 - General Application Security Issues (10 minutes)
Chapter 9 - WebServer ad E-Commerce Security (16 minutes)
Chapter 9 - Web Browser Security (8 minutes)
Chapter 9 - Email Security (14 minutes)
Chapter 9 - Database and Instant Messaging Security (5 minutes)
Chapter 10 - Incident and Disaster Response
IDS presentation
(good discussion of Snort and Tripwire)
Chapter 10 - Incident Responses and Backup (7 minutes)
Chapter 10 - Intrusion Detection Systems (Distributed and Network) (7 minutes)
Chapter 10 - Host IDSs (11 minutes)
Notes from CPSC 6136 (12 minutes)
Chapter 10 - IDSs (Action and Management) (10 minutes)
Chapter 10 - Disaster Recovery (5 minutes)
Chapter 11 - Managing the Security Function
Introduction to Assurance (7 minutes)
Chapter 11 - Organization Issues (12 minutes)
Security Planning with narration
Building Systems with Assurance (10 minutes)
Chapter 11 - Risk Analysis and Corporate Security Architecture (12 minutes)
Risk Analysis with narration
Auditing (5 minutes)
Chapter 11 - Control Principles and Operations Security (10 minutes)
Chapter 11 - Mobilizing Users and Vulnerability Testing (10 minutes)
Security Policies and Physical Security with narration
Vulnerability Analysis (7 minutes)
Chapter 12 - The Broader Perspective
Chapter 12 - Laws Governing Hacking (6 minutes)
Chapter 12 - Consumer Privacy (15 minutes)
Chapter 12 - Employee Workplace Monitoring (9 minutes)
Chapter 12 - Government Surveillance (8 minutes)
Chapter 12 - Cyberwar and Cyberterror / Hardening the Internet (8 minutes)