Changes

Jump to: navigation, search

SEC520 Weekly Schedule

400 bytes added, 14:14, 22 October 2012
no edit summary
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing::* [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.odp odp] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.pdf pdf] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.ppt ppt] ] Interpreting and Respecting the Rules for the Tank Server
:'''Reading References:'''
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration]
::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview]::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus]::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)]
:'''Resources:'''
::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports)
::*[http://www.commonexploits.com/?p=243 Using Armitage] (Metasploit Framework)
|
|
:'''Scanning, Enumeration, & Vulnerability Testing:'''
::*Vulnerability Testing
 
 
|
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing
::* [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.odp odp] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.pdf pdf] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.ppt ppt] ] Interpreting and Respecting the Rules for the Tank Server
:'''Reading References:'''
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)
|:'''YouTube Videos:'''::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview]::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus]::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)]
:'''Resources:'''
::*[http://www.commonexploits.com/?p=243 Using Armitage] (Metasploit Framework)
|
:'''Lab 3:'''
::Continue Working on '''Lab 3'''
13,420
edits

Navigation menu