7.4: Tor and the Dark Web

Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
82 min Updated Nov 20, 2024

7.1: Binary exploitation and defense

Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min Updated Apr 11, 2023

8.1: Final project

Solve CTF challenges and relate them to concepts and material learned from class.
195 min Updated Oct 22, 2024

3.1: Encoding and hashes

Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min Updated Oct 30, 2024

3.2: Encryption

Experiment with symmetric and asymmetric encryption using OpenSSL
32 min Updated Oct 29, 2024

3.3: Digital signatures

Experiment with digital signatures and certificates using OpenSSL
82 min Updated Oct 28, 2024

2.1: Linux file system

Learn basic file system navigation in Linux
159 min Updated Oct 23, 2024

2.2: Linux security

Learn basic, security-related Linux concepts and commands
58 min Updated Oct 23, 2024

5.1: Network forensics

Analyze network traces using Wireshark
50 min Updated Nov 4, 2024

5.2: Scanning

Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min Updated Nov 17, 2024

5.3: Virtual Private Networks

Run a VPN access server on Google Cloud Platform to access the Internet.
36 min Updated Nov 20, 2024

5.4: Network OSINT

Investigate network addresses using open-source intelligence tools.
53 min Updated Nov 20, 2024

5.5: DNS and user OSINT

Collect DNS and user information using open-source intelligence tools.
69 min Updated Nov 20, 2024

6.1: Privilege escalation and lateral movement

Compromise hosts via privilege escalation and lateral movement
70 min Updated Nov 22, 2024

6.2: File system backup and encryption

Experiment with Linux tools to backup and encrypt files
36 min Updated Jun 5, 2023

6.3 Host forensics

Perform forensic analysis on hosts and examine methods for log tampering
64 min Updated Nov 21, 2024

1.1: Setup

Setup course accounts and VMs
101 min Updated Nov 25, 2024

7.2: Static Application Security Testing

Utilize static analysis tools and generative artificial intelligence to identify source code vulnerabilities
37 min Updated Nov 22, 2024

7.3: Supply-chain security

Generate a software bill of materials (SBOM) to analyze a software supply chain for vulnerabilities.
43 min Updated Nov 26, 2024

4.1: Authentication

Examine issues with password-based authentication
65 min Updated Oct 5, 2024

4.2: Phishing and social engineering

Practice identifying phishing and social engineering attacks
105 min Updated Sep 14, 2022
Loading Codelabs, please wait...