- 32
- 863 771
Computer and Network Security
Приєднався 25 чер 2014
Digital Forensics Tool Validation
A demonstration on how to create media for forensic tool validation.
Переглядів: 3 146
Відео
Evaluating and Configuring Biometric Systems
Переглядів 1,9 тис.8 років тому
Includes discussion of templates, enrollment, scoring, security issues, and hacks.
Introduction to Biometrics
Переглядів 21 тис.8 років тому
I cover authentication, identification, biometrics pros and cons.
Setting up iptables logging
Переглядів 7 тис.8 років тому
In this video I demonstrate how to setup logging for iptables.
Introduction to access controls.
Переглядів 50 тис.8 років тому
This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.
4360 VPN
Переглядів 9328 років тому
Introduction to VPNs. Discussion of VPN architectures and uses, encapsulation, encryption, authentication.
Honeypots
Переглядів 49 тис.9 років тому
Honeypots are used to detect or deflect attacks against network assets. In this introduction I discuss what honeypots are, how I've used them, and how to set them up.
Wireshark
Переглядів 1,8 тис.10 років тому
Overview Brief introduction on how to use the Wireshark protocol analyzer.
Introduction to Firewalls with Iptables (part 1)
Переглядів 4 тис.10 років тому
Summary An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy. 19:54 - Windows firewall settings 29:10 - Listing of firewall rules in iptables 30:58 - Viewing incoming packet information in iptables Reference Materials Guide to Network Defe...
Introduction to Firewalls (continued)
Переглядів 2,3 тис.10 років тому
Summary An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy. 13:31 - Adding an input rule to iptables 14:55 - Flushing all firewall rules from iptables Reference Materials Guide to Network Defense and Countermeasures - Chapter 9 Additiona...
Introduction to IPTables
Переглядів 109 тис.10 років тому
Summary Extensive coverage of iptables and iptables syntax, firewall policies, and attacks: SYN flood & ping flood (smurf attack). 28:13 - nano text editor usage 28:58 - How to install vi (vim) in Ubuntu 29:15 - Review of execute permissions 29:35 - Using vim to edit the firewall rules shell script 36:24 - Review of chmod command 36:53 - netstat command usage 37:11 - How to install vsftpd 37:22...
Setup for Firewall Assignment
Переглядів 74710 років тому
Summary Information necessary to set up the environment for the firewall assignment. 0:51 - Another netstat example 2:25 - Changing VM networking from host-only to NAT 2:51 - Restarting networking in Ubuntu 4:28 - Searching software packages in Ubuntu 5:03 - Installing the Apache web server in Ubuntu 7:06 - Installing telnetd 9:59 - Creating a new user with the adduser command 11:12 - Changing ...
Introduction to Intrusion Detection
Переглядів 42 тис.10 років тому
Summary Types of IDS's, overview and usage of the Snort IDS, Snort modes and various run options. Reference Materials Guide to Network Defense and Countermeasures - Chapter 7, Chapter 8 www.snort.org/docs - Snort Documentation
Using SNORT
Переглядів 118 тис.10 років тому
Summary Creating an IDS using SNORT. Reference Materials Guide to Network Defense and Countermeasures - Chapter 7, Chapter 8 www.snort.org/docs - Snort Documentation
Federal Laws and Computer Security
Переглядів 2,5 тис.10 років тому
Federal Laws and Computer Security
Introduction to Information Security
Переглядів 5 тис.10 років тому
Introduction to Information Security
Introduction to Dr. Craiger's Courses
Переглядів 63110 років тому
Introduction to Dr. Craiger's Courses
Great explanation, thanks man!
Hagan famoso a este señor, es un genio y un verdadero maestro. Thanks Dr. Philip Craiger.
De nada. No hay problema amigo.
Hernandez Anthony Smith George Lee David
Lewis William Martin Shirley Clark Carol
Taylor Brian Johnson George Williams Ronald
tutorial still works till this day! crazy
Ameen 🎉.
i like
Can I publish in my website the public keys?
first to comment
Outstanding Pedagogy!
Access Control - determining the allowed actions on resources - controlling access to resources - Elements comprised of - subjects, objevts, operations - controlling access - setting up permissions and restrictions for different users on access to objects
How is this different from IDS again?
Hi Dr. Craiger, is there any place I can get the proper order of these videos? You have a playlist of 30 videos, and I'm pretty sure this video should be the 1st one but its 18th and there are others that I can tell should have come 1st compared to others. They are great videos, very helpful, thank you for making them!
Bro! You're good! Thank you! I've learned more in 30+ minutes than i have in my "Sec+" training through DHS over the past 5 weeks.
Well done
Hi ! Thanks for the tutorial , I have been trying to listen on the port 1883 . but nothing seems to work , could you please help I want to detect mqtt protocol via snort
Thanks a lot for this explain, you are an excellent teacher
Thank you so much i was struggling to understand how arp works and this helps a lot
Why is the narrator saying "variable" when he's talking about the directory named /var?
8 Years later and still relevant. Thank you for taking the time to put this together.
Thank you for help!!!
Does this work in Kali?
How can I create a rule to detect and drop DOS/DDOS packets?
🙏🙏👈🔔💯
I love you
Good!
Very useful still after so many years. Thanks.
Thank you so much..it's very usefull
well done
hi
sir i can not find vmnet 2 to vmnet 19 in my vmware (i unistall and setup again 4-5 but it same), please help me fix it !!!!
very nice and fun to watch. I laughed a couple of times. :)
Very nice class intro on biometrics
Sir your explanation is really superb. Thank you so much sir
thanks!
Very well put together, and informative..However my only problem is figuring out if my ISP, or my home router will be defined as my server address
This was tutorial was uploaded in 2014 and the solution still works in 2021.
nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
Sadly that FORWARD theme wasn't covered...
Fantastic - you have nailed it - a medium/advanced topic in laymans terms. It's not an easy feat. Thank you!
thanks
finally someone who knows what they are talking about and actually make a video that is worthwhile watching.
Great freaking video dude! Can't thank you enough.
THANK YOU !!!
ua-cam.com/video/XZV4J17IRNA_/v-deo.htmlkaios
m.ua-cam.com/users/results?search_query=TimesInternetLtd19+%3A+Standard+UA-cam+Channel
ua-cam.com/play/PLCVPcf48Ex66MSGrW5qw7r56H-76AOyNN.html
m.ua-cam.com/users/playlist=Igllu_list=PLCVPcf48Ex66MSGrW5qw7r56H-76AOyNN
This was the only informative video I could find. All others kept repeating asymmetric encryption part of PGP, without actually telling how I could use it using GPG