Tag: wireless networks

Electrical and Information Technology Lectuers – Lund University

The lectures will follow the course book, Computer Security, third edition, by D. Gollman. You will have to order the book yourself so it is a good idea to do it as soon as possible if you want it. You can use the second edition if you have access to it. Do not use the …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/15/electrical-and-information-technology-lectuers/

CS 161 : Computer Security Spring 2014

(University of California-Berkeley) computer security lectures notes and assigment papers. http://www-inst.eecs.berkeley.edu/~cs161/sp14/

Permanent link to this article: http://www.darknessgate.com/2014/08/15/cs-161-computer-security-spring-2014/

Computer Security Course Lectures – Israel Institute of Technology (Winter 2013-2014)

Course Objectives: Learning the different threats on computer systems. Learning different approaches for protecting computer resources. Acquiring the ability to construct and implement security policy. Presenting developments in Information and computer security. The course will not teach how to attack other computers or systems. Syllabus Computer security and information security. Basic design principles: Secrecy. Privacy, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/14/computer-security-course-lectuers-israel-institute-technology-winter-2013-2014/

Computer and Network Security (CS 475)

The key objective of this class is to provide a thorough understanding of technologies and methodologies with which computer networks can be protected. Topics that are covered include: Key Management Credentials, Steganography and Watermarking, Networking Security (VPNs, Firewalls, Intrusion Detection) and System Security Policies. Course Objectives Understand basic cryptography theory, including some well known algorithms …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/07/30/computer-and-network-security-cs-475/


Nagios is a powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes. Designed with scalability and flexibility in mind, Nagios gives you the peace of mind that comes from knowing your organization’s business processes won’t be affected by unknown outages. Nagios is a powerful tool …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/07/05/nagios/


WirelessNetView is a small utility that runs in the background, and monitor the activity of wireless networks around you. For each detected network, it displays the following information: SSID, Last Signal Quality, Average Signal Quality, Detection Counter, Authentication Algorithm, Cipher Algorithm, MAC Address, RSSI, Channel Frequency, Channel Number, and more. System Requirements: Wireless network adapter …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/10/wirelessnetview/


NetXMS is an enterprise grade multi-platform open source network management and monitoring system. It provides comprehensive event management, performance monitoring, alerting, reporting and graphing for all layers of IT infrastructure — from network devices to business application layer. The system has three-tier architecture: the information is collected by monitoring agents (either our own high-performance agents …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/08/netxms/

Network Security Toolkit (NST)

Network Security Toolkit (NST). This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/network-security-toolkit-nst/


A collection of slides related to computer security and penetration testing offered by Computer Security Group of The University of Texas at Dallas. https://csg.utdallas.edu/  

Permanent link to this article: http://www.darknessgate.com/2013/03/13/csg-utdallas-edu/

Intrusion detection Course From the University of Korea

The purpose of this class is to introduce traditional intrusion detection (type – NIDS, HIDS and hybrid IDS. method – misuse detection and anomaly detection) and advanced issues (lifecycle of vulnerability, concept of attack graph, recent anomaly detection technique). This course is for introducing recent advanced issues in the intrusion detection research area. The most …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/02/21/intrusion-detection-course-from-the-university-of-korea/

INFSCI 2935: Introduction to Computer Security

This course covers fundamental issues and first principles of security and information assurance (confidentiality/privacy, integrity, authentication, identification, authorization, availability, access control). Business issues of risk analysis and management of resources are discussed. Topics covered are issues in information system security; analysis, design, and coding of information systems/networks for security; techniques for building secure organizational systems; …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/02/14/infsci-2935-introduction-to-computer-security/