Interested in this College?
Get updates on Eligibility, Admission, Placements Fees Structure
Compare Quick Facts
Medium Of Instructions | Mode Of Learning | Mode Of Delivery |
---|
English | Self Study, Virtual Classroom | Video and Text Based |
Courses and Certificate Fees
Certificate Availability | Certificate Providing Authority |
---|
yes | IIT Kanpur |
The Syllabus
- Introduction
- Interview with Prof.Sandeep Shukla CSE IIT kanpur
- What is computer security and what to learn?
- Learning objectives
- Sample Attacks
- The Marketplace for vulnerabilities
- Error 404 Hacking digital India part 1 chase
- Control Hijacking
- More Control Hijacking attacks integer overflow
- More Control Hijacking attacks format string vulnerabilities
- Defense against Control Hijacking - Platform Defenses
- Defense against Control Hijacking - Run-time Defenses
- Advanced Control Hijacking attacks
- Confidentiality Policies
- Confinement Principle
- Detour Unix user IDs process IDs and privileges
- More on confinement techniques
- System call interposition
- Error 404 digital Hacking in India part 2 chase
- VM based isolation
- Confinement principle
- Software fault isolation
- Rootkits
- Intrusion Detection Systems
- Secure architecture principles isolation and leas
- Access Control Concepts
- Are you sure you have never been hacked Sandeep Shukla
- Unix and windows access control summary
- Other issues in access control
- Introduction to browser isolation
- Web security landscape
- Web security definitions goals and threat models
- HTTP content rendering
- Browser isolation
- Security interface
- Cookies frames and frame busting
- Major web server threats
- Cross site request forgery
- Cross site scripting
- Defenses and protections against XSS
- Finding vulnerabilities
- Secure development
- Basic cryptography
- Public key cryptography
- RSA public key crypto
- Digital signature Hash functions
- Public key distribution
- Real world protocols
- Basic terminologies
- Email security certificates
- Transport Layer security TLS
- IP security
- DNS security
- Internet infrastructure
- Basic security problems
- Routing security
- DNS revisited
- Summary of weaknesses of internet security
- Link layer connectivity and TCP IP connectivity
- Packet filtering firewall
- Intrusion detection
- Concluding remarks
Articles