Skip main navigation

Getting the most out of your learning

Coventry University believes that a good student experience is central to learning at a world class standard. To reflect our success we were recently awarded the title of University of …

Continue learning with Coventry University

Thank you for joining us in this short course on Basics of Network Security. We hope that you enjoyed your learning experience. This short course is the introductory two-week course …

Review of the Week

Congratulations! You have now completed this Short Course on Basics of Network Security.  During the second week of this short course we looked at: The challenges in securing computer networks …

Secure the server

The SSH server needs to be configured to prevent such attacks. We will look into one possible way for doing that and test the scan again. We will add two …

Setting up your network

Note: Your networking should be already set up for the exercise in the VMs. You can verify this by looking at the IP addresses of the network interfaces in the …

Attacking an SSH server

Often the port scan will be followed by a brute-forcing attack if an authenticated service has been discovered. We will perform a password brute-forcing attack on the SSH server which …

IDS detection of a port scan

Many cyber attacks begin with a port scan. Being able to detect such scans will give us an early warning that our network and systems are being targeted and possibly …

Who is winning?

The ‘battle’ between cyber attackers and defenders is a very dynamic one, with new technologies (both offensive and defensive) constantly being developed and deployed. Attackers continually come up with new …

Defender vs attacker

In order to defend our infrastructure more effectively we first need to understand who could be actually attacking us, and what are their methods and motivations. We can break the …

Do it yourself

Your task Run the scans from the previous step yourself. Carefully check the results that you get and compare them with those without a firewall. Further challenge Perform a scan …

Scan a target behind a firewall

Watch the video in which we perform a basic host scan of a target behind a firewall. We are now going to turn on the firewall on the server and …

Introduction to firewalls

Firewalls are expected to be part of the security of every computer system and network. In its basic functionality, a firewall monitors the incoming and/or outgoing traffic and decides whether …

Do it yourself

Your task Run the scans from the previous step yourself. Share the results that you get. Further challenge Nmap is capable of probing the OS and running services to determine …

Scanning a target

Watch the above video in which we perform a basic host scan. Find out whether it is behind a firewall and what services are running on it. Over the next …