Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Courses > TCP/IP Security
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|TCP/IP Security  
> Access to the content HTML Beginning of the course  
> Description  
> Context & Dates Material of our "TCP/IP Networks Security" course.
The material available here is the one used during the EFE seminar "Sécurité des réseaux et systèmes d'information" on 25 November 1999; future sessions of this course may use a revised version of the slides.
> Author Stéphane Aubert 
> Type Course material - [ - ]  
> Abstract &
Table of content
Page de garde

Les reseaux IP...
    Introduction aux reseaux IP
    Principe de base de IP
    Notion de routage
    Notion de paquet IP
    Format d'un paquet IP
    Principaux champs d'un paquet IP
    Le champs Time to Live (TTL)
    Fragmentation IP
    Re-assemblage de fragments
    Exemples de messages ICMP
    Format d'un message ICMP
    Le protocole UDP
    Le protocole TCP
    Les principaux champs TCP
    Les drapeaux (flag) TCP
    Presentation d'une session TCP

Les attaques...
    Techniques d'attaque / d'intrusion
    Description d'une attaque
    Recherche (technique) d'information
    Decouverte de machines via le DNS
    Decouverte de machines par balayage
    Decouverte de ports ouverts par balayage
    Determination des systemes d'exploitation
    Techniques de balayage avec nmap
    Techniques de balayage avec nmap
    Decouverte de ports ouverts
    Exemple d'utilisation de nmap
    Determination du filtrage IP
    Prise de controle d'un serveur
    ICMP : loki
    TCP : rwwwshell
    Canaux caches
    Attaques sur les reseaux locaux
    Ecoute de reseau (sniffing)
    Usurpation d'adresse (spoofing)
    Vol de session (hijacking)
    Attaque par deni de service
    Exemple via IP : land
    Exemple via UDP : teardrop
    Via TCP : SYN-flooding (meme avec firewall)
    Autres exemples

Se proteger...
    Comment se proteger d'Internet ?
    Exemple d'architecture
    Exemple d'architecture
    Exemple d'architecture
    Concevoir sa passerelle de securite
    La securite active
    Cloisonnement de la passerelle
    Filtrage IP
    Differents types de filtre IP
    Utilisation de commutateurs
    Rele des relais
    Ne pas oublier

La detection d'intrusion...
    La detection d'intrusion
    Detection d'attaque ou d'intrusion
    Methodes de detection d'intrusion
    Detection sur chaque serveur (host)
    Detection par ecoute de réseau (snif)
    Limites des IDS
    Lutte entre techniques d'intrusion et IDS
    Techniques d'evasion des IDS
    Detection de sniffer et d'IDS
    Detection de sniffer et d'IDS
    Attaques coordonnées
    Attaques contre les IDS
    Presentation de whisker
    Pollution d'IDS
    Option DECOY de NMAP
    Question pour un IDS


> Related documents
[Course]  TCP/IP Networks Security
[Course]  Networks and Communications Security
[Tool]  Dns2tcp tool [Dns2tcp is a tool to encapsulate TCP Frame in DNS traffic. - English]
[Tool]  Net::RawSock tool [Sending raw IP datagrams using Perl - English]
[Article]  Introduction to the TCP/IP protocols family [February 1997 - French]
themeNetwork Security
[Presentation]  IPv6 Networks Discovery [30 May 2007 - French]
[Presentation]  IPv6: Network Security Threats [15 November 2006 - English]
[Presentation]  IPv6: impacts and threats [14 November 2006 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Ethereal: an open-source network analyzer and a must-have security tool [2 February 2005 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Network security: Introduction and Bluetooth [9 November 2000 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Policy managment for network security [29 May 2000 - French]
[Presentation]  Firewalls, protection and supervision, VPNs: situation of the security tools market [20 January 2000 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Presentation]  Network security techniques [6 March 1997 - French]
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.


Last modified on 6 July 2009 at 15:04:18 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants