Learning Computer Security
and ethical hacking

 

Open educational resources

Introducing fundamentals of security

Ethical hacking and computer security concepts

Authentication and access controls

(in)Secure code

Incident investigation and response

Join us at Leeds Beckett


Open educational resources

Below you will find many openly-licensed educational resources (OER). Most are released under a Creative Commons Attribution-ShareAlike license, as specified. You are free to share, modify, and reuse, so long as you give attribution and also share derivative works under a compatible license.

These materials have been developed for use at Leeds Beckett University and affiliated institutions. If you are a student at Leeds Beckett, please access lab materials via MyBeckett, since you will also have permission to comment on the lab sheets, and have access to the correct versions for the modules you are enrolled on.

You are welcome to use these materials to teach yourself or others, so long as you adhere to the licensing. Please let me know if you make use of these.

Introducing fundamentals of security

Lectures playlist

Lab: Malware and Anti-malware (fun with Trojans)

Hide<< Cached PDF Open

Lab: Firewalls and Software Updates

Cached PDF Open

Lab: Identity, Authentication, and Access Control

Cached PDF Open

Lab: Open Source Intelligence Gathering and Social Engineering

Open

Lab: Introduction to Ethical Hacking

Cached PDF Open

Ethical hacking and computer security concepts

Lectures playlist

Lab: Introduction to Linux and security tools

Hide<< Cached PDF Open

Lab: Malware and an Introduction to Metasploit and Payloads

Cached PDF Open

Lab: Vulnerabilities, exploits, and remote access payloads

Cached PDF Open

Lab: Information gathering: footprinting

Cached PDF Open

Lab: Information gathering: scanning

Cached PDF Open

Lab: From scanning to exploitation

Cached PDF Open

Lab: Vulnerability analysis

Cached PDF Open

Lab: Post-exploitation

Cached PDF Open

Lab: Lockpicking

Cached PDF Open

Lab: Introduction to Web security

Cached PDF Open

Access controls

Lectures playlist

Lab: Identity, Authentication, and Unix

Hide<< Cached PDF Open

Lab: Access Controls and Unix/Linux File Permissions

Cached PDF Open

Lab: Sandboxing, Virtualisation, and Mobile Device Security

Cached PDF Open

Lab: Network-based Identity Management and LDAP

Cached PDF Open

(in)Secure code

Lectures playlist

Lab: Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows

Hide<< Cached PDF Open

Lab: Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks

Cached PDF Open

Lab: Bug Hunting Using Fuzzing and Static Analysis

Cached PDF Open

Lab: Exploit Development

Cached PDF Open

Incident investigation and response

Lectures playlist

Lab: Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Hide<< Cached PDF Open

Lab: Log Management: Monitoring and Making Sense of Logs

Cached PDF Open

Lab: Integrity Management: Protecting Against and Detecting Change

Cached PDF Open

Lab: Contingency Planning and Backups: SSH/SCP, Deltas, and Rsync

Cached PDF Open

Lab: Analysis of a Compromised System Part 1: Live (Online) Analysis and Data Collection

Cached PDF Open

Lab: Analysis of a Compromised System Part 2: Dead (Offline) Analysis

Cached PDF Open

Lab: Risk Management: Risk Assessment and Planning

Cached PDF Open

Lab: Malware Analysis

Cached PDF Open

Lab: Hacker vs Hacker

Cached PDF Open

Join us at Leeds Beckett University

Our main security-related degrees at Leeds Beckett are currently:

Click the links above or send an email for more information.