Introduction to the tools and techniques used to secure computers; data networks; and digital information. How attackers view and identify vulnerabilities; weaknesses. Methods to attack and secure operating systems; communications infrastructures; and data networks including TCP/IP and the Internet; including attacker applications. Demonstration and hands-on exercises.

This collection contains course-specific video instruction developed by Dr. Phlip Craiger. Some videos are used for both CYB 335 and CYB 155 courses.

Follow

Videos

File

Simple Network Investigation: ping, nmap, Wireshark, netstat, J. Philip Craiger

File

Introduction to Linux 2019 (1 of 4), J. Philip Craiger

File

Introduction to Linux 2018 (1 of 4), J. Philip Craiger

File

Introduction to Linux 2018 (2 of 4), J. Philip Craiger

File

Introduction to Linux 2018 (3 of 4), J. Philip Craiger

File

Introduction to Linux 2018 (4 of 4), J. Philip Craiger

File

Intelligence Gathering: Identifying Information Involving a Phishing Attempt, J. Philip Craiger

File

VPNs: Virtual Private Networks, J. Philip Craiger

File

Connecting to the VM Server, J. Philip Craiger

File

Vulnerability Scanning with Nessus, J. Philip Craiger

File

OpenVAS for Vulnerability Scanning, J. Philip Craiger

File

Creating Cryptographic One-Way Hashes in Windows, J. Philip Craiger

File

Packet Sniffing, J. Philip Craiger

File

Running Traceroute, J. Philip Craiger

File

Wireshark in Kali Linux, J. Philip Craiger

File

Understanding Base64 Encoding, J. Philip Craiger

File

Mounting a Personal Volume, J. Philip Craiger

File

IPTables Firewalls in Linux, J. Philip Craiger

File

Installing and Configuring Snort, J. Philip Craiger

File

Open source intelligence: Footprinting, J. Philip Craiger

File

Network Scanning and Fingerprinting, J. Philip Craiger

File

Connecting to SSIA Virtual Machines, J. Philip Craiger

File

Introduction to Metasploit, J. Philip Craiger

File

Metasploit Exercise Walkthrough, J. Philip Craiger

File

MacOS High Sierra No Root Password, J. Philip Craiger

File

Password Cracking with John the Ripper, J. Philip Craiger

File

Assignment 3.3 Vulnerabilities, J. Philip Craiger

File

Citation Machine for APA Formatting, J. Philip Craiger

File

Wireshark Demo 2020, J. Philip Craiger