Introduction to Linux and shell commands.Īlso see ldap, radius, snort and iptables in Networking. ![]() Introduction to managing users and groups and file permissions. Use of the denyhost utility to block brute force attacks on SSH Runtime invariant to number of detected people. Main Functionality: 2D real-time multi-person keypoint detection: 15, 18 or 25-keypoint body/foot keypoint estimation, including 6 foot keypoints. Introduction to passwords and elementary cracking schemes. The OpenPose runtime is constant, while the runtime of Alpha-Pose and Mask R-CNN grow linearly with the number of people. System log basic usage and configuration on a CentOS system.ĭata recovery from deleted files within EXT2 and NTFS file systems.įile integrity checking and intrusion detection with AIDE System log basic usage and configuration on an Ubuntu system. ![]() Use of Linux capabilites to limit program privileges. Using tar and dump/restore for file backups, including remote backups. And Network Traffic Analysis below.Ĭontrol sharing of information within an SQL database per an information security policy. Use a Radius authentication service to authenticate network devices.Īuthenticate users of Linux servers using an LDAP service.Įxplore the Gateway Border Protocol and configure a BGP router.Įxplore the Open Shortest Path First router protocol and use it to create a spoofed website.Īlso see crypto labs, e.g., ssh, vpn and ssl labs. Use of snort for network intrusion detection Use of ARP spoofing for Man-in-the-middle attacks.ĭNS spoofing and cache poisoning on a local area network. ![]() TCP/IP protocol vulnerabilities, including SYN flooding, RST attacks and session hijacking. The iptables utility is used to configure a “firewall” component to only forward selected application service traffic between a client and a server. The nmap utility is utilized in combination with the tshark network traffic analysis utility to demonstrate a security problem with an ssh server.īasic networking including ARP, ping and an introduction to TCP/IP.Ī simple routing example with two LANs and an internet connection via NATĪn introduction to DNS fuctions and its protocol. The nmap utility is used to locate an ssh server on a network and to discover the port number being used by the service. The student uses telnet to access a remote computer, and employs the tcpdump tool to view plaintext passwords, and to observe how use of ssh mitigates that vulnerability.
0 Comments
Leave a Reply. |