Careers360 Logo
Interested in this College?
Get updates on Eligibility, Admission, Placements Fees Structure
Compare

Quick Facts

Medium Of InstructionsMode Of LearningMode Of Delivery
EnglishSelf Study, Virtual ClassroomVideo and Text Based

Courses and Certificate Fees

Certificate AvailabilityCertificate Providing Authority
yesIIT Kanpur

The Syllabus

  • Introduction
  • Interview with Prof.Sandeep Shukla CSE IIT kanpur
  • What is computer security and what to learn?
  • Learning objectives
  • Sample Attacks
  • The Marketplace for vulnerabilities
  • Error 404 Hacking digital India part 1 chase

  • Control Hijacking
  • More Control Hijacking attacks integer overflow
  • More Control Hijacking attacks format string vulnerabilities
  • Defense against Control Hijacking - Platform Defenses
  • Defense against Control Hijacking - Run-time Defenses
  • Advanced Control Hijacking attacks

  • Confidentiality Policies
  • Confinement Principle
  • Detour Unix user IDs process IDs and privileges
  • More on confinement techniques
  • System call interposition
  • Error 404 digital Hacking in India part 2 chase

  • VM based isolation
  • Confinement principle
  • Software fault isolation
  • Rootkits
  • Intrusion Detection Systems

  • Secure architecture principles isolation and leas
  • Access Control Concepts
  • Are you sure you have never been hacked Sandeep Shukla
  • Unix and windows access control summary
  • Other issues in access control
  • Introduction to browser isolation

  • Web security landscape
  • Web security definitions goals and threat models
  • HTTP content rendering
  • Browser isolation
  • Security interface
  • Cookies frames and frame busting

  • Major web server threats
  • Cross site request forgery
  • Cross site scripting
  • Defenses and protections against XSS
  • Finding vulnerabilities
  • Secure development

  • Basic cryptography
  • Public key cryptography
  • RSA public key crypto
  • Digital signature Hash functions
  • Public key distribution
  • Real world protocols
  • Basic terminologies
  • Email security certificates
  • Transport Layer security TLS
  • IP security
  • DNS security

  • Internet infrastructure
  • Basic security problems
  • Routing security
  • DNS revisited
  • Summary of weaknesses of internet security
  • Link layer connectivity and TCP IP connectivity
  • Packet filtering firewall
  • Intrusion detection
  • Concluding remarks

Instructors

Articles

Back to top