Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Offensive, Defensive, and Forensic Techniques for Determining Web User Identity

OpenSecurityTraining2 via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn offensive, defensive, and forensic techniques for determining web user identity in this comprehensive security training course. Explore web user identification from multiple perspectives, starting with server-side techniques for identifying users, then examining obfuscation methods for users seeking anonymity, and concluding with forensic analysis techniques for identifying users from hard drives and similar media. Master the characteristics of internet connections and IP geolocation methods to track user origins. Discover browser identification techniques and understand how users can leverage borrowed WiFi connections, shell accounts, and cloud services to mask their identity. Examine various anonymization tools and techniques, including web browser privacy modes and email origin obfuscation methods. Develop skills in advanced web browser attacks and defenses, then apply forensic methodologies to analyze databases and log files for user identification. Gain practical knowledge through hands-on exercises covering both the technical aspects of user tracking and the countermeasures employed to maintain anonymity online.

Syllabus

Part1: Web User Identification: Intro
Part2: Web User Identification: Characteristics Of Internet Connections
Part3: Web User Identification: IP Geolocation
Part4: Web User Identification: Browser Identification
Part5: Web User Identification: Borrowing Wifi Connections
Part6: Web User Identification: Shell & Cloud Accounts
Part7: Web User Identification: Anonymizers
Part8: Web User Identification: Web Browser Privacy Modes
Part9: Web User Identification: Email Origin Obfuscation
Part10: Web User Identification: Further Web Browser Attacks & Defenses
Part11: Web User Identification: Forensic Database Analysis
Part12: Web User Identification: Forensic Log Analysis

Taught by

OpenSecurityTraining2

Reviews

Start your review of Offensive, Defensive, and Forensic Techniques for Determining Web User Identity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.