Difference between revisions of "SEC52O Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
Line 47: Line 47:
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)]  (Chapters 1 - 3)-->
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)]  (Chapters 1 - 3)-->
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)-->
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)-->
 
+
::*
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance]
 
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance]
Line 92: Line 92:
 
:'''Reading References:'''
 
:'''Reading References:'''
 
<!-- DEAD LINK::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)-->
 
<!-- DEAD LINK::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)-->
 
+
::*
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
Line 150: Line 150:
 
:'''Reading References:'''
 
:'''Reading References:'''
 
<!-- DEAD LINK::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )-->
 
<!-- DEAD LINK::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )-->
 
+
::*
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
 
::*Linux Hardening
 
::*Linux Hardening
Line 200: Line 200:
 
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )-->
 
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )-->
 
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )-->
 
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )-->
 
+
::*
 
:'''Resources:'''
 
:'''Resources:'''
 
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
 
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
Line 292: Line 292:
 
:'''Reading References:'''
 
:'''Reading References:'''
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)-->
 
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)-->
 
+
::*
 
|
 
|
  
Line 332: Line 332:
  
 
:'''Reading References:'''
 
:'''Reading References:'''
::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )
+
<!--DEAD LINK::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )-->
 
+
::*
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003]
 
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003]
Line 371: Line 371:
  
 
:'''Reading References:'''
 
:'''Reading References:'''
::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
+
<!--::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]-->
 
+
::*
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
+
<!--::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )-->
  
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''

Revision as of 12:55, 1 February 2018

Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:


Week 3


System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authentication):
  • PKI
  • PAM
  • Kerebos


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 1)
Reading References:
YouTube Videos:
  • Linux Hardening
Part1 | Part 2 | Part 3
Resources:


Lab 4:
System Hardening


Week 4



System Hardening in Linux / Continued:
  • AAA Protocol (Authorization):
  • ACLs
  • SELinux
  • Sudo
  • Cron Jobs
  • Turning Off Xwindows


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 2)
YouTube Videos:
Reading References:
Resources:


Lab 5:
System Hardening
Week 5



Midterm (Test #1) Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Types of Attacks:
  • Client-side Attacks
  • Phishing
  • Webbrowser - Malicious Payloads
  • IP Spoofing (Man in the Middle) / Password
  • Server-side Attacks
  • Out-dated Software Patches
  • Database Injection
  • Password Cracking



Slides (Concepts):
YouTube Videos:
Reading References:


Lab 6:
Attack Categories:
WARNING!
Scanning ports and exploiting servers must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.




Study Week


Week 8


Hardening Windows 2003 Server:
  • Installing and Configuring Security Configuration Wizard
  • Using New Technology File System (NTSF)
  • Configuring Automatic Updates


Slides (Concepts):
Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring
  • Iptables
  • Using Tripwire



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Intrusion Detection / Using Tripwire
Reading References:
YouTube Videos:
Additional Resources (for interest):


Lab 8:
Assignment #2 Posted:
Week 10


Additional Considerations:
  • Decoys: Honey-Pots
  • Disaster Recovery
  • The BIGGER Picture


Slides:
  • [odp] [pdf] [ppt] Additional Considerations
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13



Final Exam Review
  • Details



Exam Week - TBA