7.4: Tor and the Dark Web
Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
82 min
Updated Nov 20, 2024
7.1: Binary exploitation and defense
Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min
Updated Apr 11, 2023
8.1: Final project
Solve CTF challenges and relate them to concepts and material learned from class.
195 min
Updated Oct 22, 2024
3.1: Encoding and hashes
Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min
Updated Oct 30, 2024
3.2: Encryption
Experiment with symmetric and asymmetric encryption using OpenSSL
32 min
Updated Oct 29, 2024
3.3: Digital signatures
Experiment with digital signatures and certificates using OpenSSL
82 min
Updated Oct 28, 2024
2.1: Linux file system
Learn basic file system navigation in Linux
159 min
Updated Oct 23, 2024
2.2: Linux security
Learn basic, security-related Linux concepts and commands
58 min
Updated Oct 23, 2024
5.1: Network forensics
Analyze network traces using Wireshark
50 min
Updated Nov 4, 2024
5.2: Scanning
Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min
Updated Nov 17, 2024
5.3: Virtual Private Networks
Run a VPN access server on Google Cloud Platform to access the Internet.
36 min
Updated Nov 20, 2024
5.4: Network OSINT
Investigate network addresses using open-source intelligence tools.
53 min
Updated Nov 20, 2024
5.5: DNS and user OSINT
Collect DNS and user information using open-source intelligence tools.
69 min
Updated Nov 20, 2024
6.1: Privilege escalation and lateral movement
Compromise hosts via privilege escalation and lateral movement
70 min
Updated Nov 22, 2024
6.2: File system backup and encryption
Experiment with Linux tools to backup and encrypt files
36 min
Updated Jun 5, 2023
6.3 Host forensics
Perform forensic analysis on hosts and examine methods for log tampering
64 min
Updated Nov 21, 2024
1.1: Setup
Setup course accounts and VMs
101 min
Updated Nov 25, 2024
7.2: Static Application Security Testing
Utilize static analysis tools and generative artificial intelligence to identify source code vulnerabilities
37 min
Updated Nov 22, 2024
7.3: Supply-chain security
Generate a software bill of materials (SBOM) to analyze a software supply chain for vulnerabilities.
43 min
Updated Nov 26, 2024
4.1: Authentication
Examine issues with password-based authentication
65 min
Updated Oct 5, 2024
4.2: Phishing and social engineering
Practice identifying phishing and social engineering attacks
105 min
Updated Sep 14, 2022
Loading Codelabs, please wait...