Sample Lectures ... of the complete simulator package ... from just $38

Sample Lectures

We have included a number of on-line lectures, which cover some of the key principles involved within NetworkSims.com. An example is:

Advanced Security and Network Forensics

  1. Lecture (Introduction).
  2. Lecture (Threats).
  3. Lecture (Network Forensics).
  4. Lecture (Data hiding and Obfuscation).
  5. Lecture. (Web Infrastructures).
  6. Lecture (Cloud Computing).
  7. Accessing services on Windows 2003. This gives an overview of accessing important services, such as Telnet, FTP, SMTP, and so on, from Windows 2003 for Lab 1.
  8. Toolkit 1 demo. This provides an overview of Toolkit 1 lab for Lab 1. Source code [here].
  9. Toolkit 2 demo. This provides an overview of Toolkit 2 lab for Lab 2. Source code [here].
  10. Demo of Linux services. This gives an overview of accessing important services, such as Telnet, FTP, SMTP, and so on, from Linux (Lab 2).
  11. Toolkit. This is a program which can be used to investigate client/server applications [demo]. Run client.exe and it should have the client and server program in it. Also it contains a packet capture tab, where you can see the network connections.
  12. Demo of Nessus. Nessus is an excellent vulnerability scanner.
  13. Cross scripting example. This shows an example of an SQL injection attack, which is an example of a cross-scripting threat.
  14. SQL examples. This shows some examples of basic SQL.
  15. IDS detecting ping and port scan. This shows a simple example of using IDS for detecting a ping on a host, and' also in using the sfportscan preprocessor to detect a port scan.
  16. Snort example using ProfSIMS.
  17. Hydra vulnerability scanning. The Hydra program allow administrators to scan their servers, such as for FTP and Telnet, for vulnerabilities. This example shows a practical scan for a range of user names and passwords.
  18. Hping vulnerability scanning. The hping program can be used to craft data packet which can be used for vulnerability testing.
  19. Network Forensics. This shows an example of analysing simple network traces.
  20. Tripwire. This shows an example of configuring Tripwire in Linux.
  21. Encryption/Hashing/etc. This shows examples from the encryption/hashing part of the Toolkit. Run TCP Dump.
  22. RSA Public key. This shows examples from the RSA encryption part of the Toolkit. Run TCP Dump.
  23. Brute force. This shows an example of brute force on encrypted content.
  24. Digital Certificates. This shows the importing of digital certificates.
  25. Encoding. This shows an example of converting from ASCII, Base-64, Hex, and Binary, into the other formats.
  26. Ex-OR encoding. This shows an example of Ex-OR encoding.
  27. Demo of S3CMD for Amazon S3.
  28. EC2 tools
  29. Real-life demo of instance creation.

 

Home | About Us | Our Software | Contact | Privacy Policy
NetworkSims.com is an independent company and is not affiliated with any other organisation or individual, whether academic or commercial.