Difference between revisions of "SEC52O Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
Line 136: Line 136:
 
::*Rule of Preventative Action
 
::*Rule of Preventative Action
 
::*Rule of Separation
 
::*Rule of Separation
::*Rule of Least Priviledge / Rule of Trust
+
::*Rule of Least Privilege
 
:::*AAA Protocol (Authorization, Authentication, Accounting)
 
:::*AAA Protocol (Authorization, Authentication, Accounting)
::::*Auhentication: PAM, ACLs, SSH (Key Generation)
+
::::*Auhentication:
 +
::::* PAM & ACLs
 +
::::*PKI, SSH (Key Generation)
  
 
|
 
|

Revision as of 09:43, 9 June 2012

Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing
  • Client-side Attacks:
  • Human-side Errors
  • Operating System / Applications (Metasploit)
  • Phishing
  • Social Networking


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:
  • Details: N/A


Week 3


System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authorization, Authentication, Accounting)
  • Auhentication:
  • PAM & ACLs
  • PKI, SSH (Key Generation)


Slides (Concepts):
  • [odp] [pdf] [ppt] System Hardening: Preventative Action / Separation


Reading References:
YouTube Videos:
Resources:


Lab 4:
Linux System Hardening (Part 1)


Week 4



System Hardening in Linux / Continued:
  • AAA Protocol - Authorization:
  • Cron Jobs
  • SELinux
  • Sudo
  • Iptables


Slides (Concepts):
  • [odp] [pdf] [ppt] System Hardening: Least Priviledge / Trust
YouTube Videos:
Reading References:
Resources:


Lab 5:
Linux System Hardening (Part 2)
Week 5



Midterm (Test #1 )Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Network-Side Attacks:
  • Database Services
  • TCP Stacks
  • Web Server / Web Applications


Slides (Concepts):
  • [odp] [pdf] [ppt] Network-Side Attacks
Reading References:
  • x
YouTube Videos:
Resources:


Lab 6:



Study Week


Week 8


Hardening Windows:
  • Hardening Windows Systems


Slides (Concepts):
  • [odp] [pdf] [ppt] Hardening Windows


Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring
  • Using Tripwire



Slides (Concepts):
  • [odp] [pdf] [ppt] Intrusion Detection / Using Tripwire


Reading References:
YouTube Videos:
Resources:


Lab 8:
Assignment #2 Posted:
  • Details - N/A
Week 10


Additional Considerations:
  • Decoys: Honeypots
  • Packet Sniffers
  • Malware
  • Trojan Horses


Slides:

  • [odp] [pdf] [ppt] Securing the Perimeter
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13


Final Exam Review

  • Details



Exam Week - TBA