Class takes place each Friday morning from 9:15 to 12:15. The link to the live chat help on collaborate ultra will be posted prior to lab. The lectures will be live followed by a demonstration by me off the labs so people can follow along. They will also be recorded and available after each lecture only on Blackboard. The Syllabus lists some of the core texts and finer details of this module from an administrative viewpoint.
The philosophy of this module is not to confuse you with ‘spagetti code’ for low level network device handling but rather to provide you with a theoretical underlying knowledge of networking and within the labs to demonstrate the relative ease with which modern networks can be programmed to send information.
Lecture 1: Introduction to Networks and Introduction to Wireshark
Optional additional reading: A Short History of the Internet by Bruce Sterling.
Optional video clip History of the Internet in 8 minutes
Lecture 3: Data Link Layer
Optional additional reading: An Architectural Framework for Data Link Layer Security with Security Interlayering By Altunbasak et al.
Optional video clip: Data Link Layer
Lecture 4: Medium Access Control Sub Layer
Optional additional reading: MAC Layer Dynamic Backoff Scheme for Message Delivery Reliability in Wireless Sensor Networks by CBadi et al.
Optional video clip: OSI Model Demystified
Lecture 7: Application Layer
Optional additional reading: A Survey of P2P in various networks by Anita et al.
Optional video clip: The Convergence of Blockchain, Machine Learning, and the Cloud – Steve Lund, TEDx Talk
Week 1 Supplementary Tutorials
Web Page Load Test – Run a diagnostic on www.ulster.ac.uk to see resource loading waterfall charts, Page Speed optimization checks and suggestions for improvements.
Web Page Load Comparison – Compare 2 sites such as www.ulster.ac.uk and www.qub.ac.uk to see how optimised they are.
Mobile Web Page Load Test – This mobile page load test needs to be conducted on your mobile phone. Visit Googles TestMySite and load a site. It will give you the loading time and estimated visitor loss.
Ethernet – Wireshark Network Packet Sniffing Word version
Netstat – Command line tool which presents information on active network connections and overall statistics.
NetInfo – Using Netinfo to Collect Computer and Network Information
Week 2 Supplementary Tutorials
How well are you protected against non-consensual Web tracking?
Check to see if you have been exposed in a data breach
Week 3 Supplementary Tutorials
HTTP vs HTTPS Test – Compare load times of the unsecure HTTP and encrypted HTTPS versions on a page
WayBackMachine – Check out sites such as Ulster, BBC and Hotmail to see how they have progressed (click bar graph at top to get quick views).
Google Data Centers – Short video exploring a Google data center with Street View.
Week 4 Supplementary Tutorials
Bandwidth – Measure your Internet Connection upload & download speeds
Online Network Tools – An easy way to ping, traceroute, resolve names, check countries of origin and ports open.
Class Test 1 at 12:00 on Friday.
Week 6 Supplementary Tutorials
Phishing IQ Test – Take a test to see if you tell the difference between a legitimate and phishing email?
Think you can Outsmart Internet Scammers? – Take a test to tell the difference between a legitimate website and one that is a phishing attempt
Can you spot a fake email? – Another phishing email IQ test
Exposed Amazon S3 buckets. – Search S3 buckets for personal information exposed. First read S3 buckets overview & how to search open Amazon buckets.
SSL/TLS – Wireshark Network Packet Sniffing Word version
RSA, DEP, Browser Security, Hash Generation & Digital Certificates – Practical examples of implementing security Word version
Week 8 Supplementary Tutorials
How long to hack my password – Find out how long your sacred password would take to bruteforce
Live Visualisation of Real-Time Worldwide Attacks. More from Fireeye, Kaspersky and Arbor Networks
Netcraft – Useful site for hackers to see what kind of server a site is running and time since last reboot.
HTTP Delay Estimation – “back-of-the-envelope” visualizations and calculations for Web response times.
Cryptography – Interact with this dynamic substitution cipher form.
Cryptography – Interact with the symbolic pigpen substitution cipher.
Week 9 Supplementary Tutorials
Firewalls – Firewall Visualisation Tool
Shields Up – Test your machines network defenses online
Cryptography – Scroll down and enter text into form to see frequency analysis. The more text entered – the truer the overall frequency count.
Week 11 Supplementary Tutorials
Browser Market share & other Internet Technologies statistics
Network Performance Monitoring – Visit Orion, click Login box on top left of page. Browse all data.
Check to see if you or a colleague is running an exposed local web server
Class test 2
Please note that the first class test will examine you on what we did in lab class & the lecture material from weeks 1 to 5 inclusive. The final class test will examine you on content in labs and material covered in lecture from week 6 to week 11 inclusive.
CLASS Test 1 – 50% (Week 6)
Class test during lab session on material covered in labs from weeks 1 to 5.
CLASS Test 2 – 50% (Week 12)
Class test during lab session on material covered in labs from weeks 6 to 11. (Now of course it will be done remotely at 12:00 on the Friday of week 12)
From Nand to Tetris in 14 steps – Noam Nisan presents his approach to teaching the how to build a simple computer system end-to-end
Human Computation – Excellent talk by MacArthur Fellow Prof Luis von Ahn.
15 Years Linux: Past and Future
Sun Solaris: Does the OS really matter – part 1
Sun Solaris: Does the OS really matter – part 2
Visualising Social Networks
Accelerating Innovation: People, Processes, & Technology
Network Security from CISCO.
Galileo – European Satellite Navigation System
How To Break Web Software – A look at security vulnerabilities in web software by Mike Andrews (Google TechTalk)
Google I/O 2012 – SQL vs NoSQL: Battle of the Backends
Human Engine Optimization: Natural Strategies for High Ranking Health
Building Brains to Understand the World’s Data
World’s Biggest Data Breaches, Information is Beautiful
11 Steps Attackers Took to Crack Target, CIO.com
Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid, Wired
The Security Mindset, Schneier on Security
Cybersecurity unemployment rate at zero, SC Media
Network live IP video cameras directory, Insecam.org
Hackers Remotely Kill a Jeep on the Highway—With Me in It, Andy Greenberg, Wired
Florida man wins over 1 million miles for hacking United Airlines, Jack Corrigan, WGN TV
Computer hackers can now hijack toilets, Sarah Griffiths, Daily Mail
Baby monitor hacker delivers creepy message to child, CBS News
It’s Insanely Easy to Hack Hospital Equipment, Kim Zeller, Wired
Here’s What We Know About the Massive Cyber Attack That Took Down the Internet on Friday, Peter Dockrill, Science Alert
How the Dyn DDoS attack unfolded, Tim Greene, Network World
MEECES to pieces, Deborah Radcliff, Network World
Flight Radar – See flights in the air around the world