|
|
Line 105: |
Line 105: |
| [[Image:blank-cd.png|thumb|left|75px]]'''Windows 2003 Server CD (Enterprise and Standard 32-bit):''' | | [[Image:blank-cd.png|thumb|left|75px]]'''Windows 2003 Server CD (Enterprise and Standard 32-bit):''' |
| <ul> | | <ul> |
− | <li>'''Download URL:''' [https://inside.senecac.on.ca/clientservices https://inside.senecac.on.ca/clientservices]<br /> (Select '''Software Access''' -> '''Software Downloads''' -> '''MSDN''')<br />(Select <b>Downloads</b>, then select <b>MSDN</b> and log in with your user name and password. Download a key for the product , using same URL as above, then select <b>MSDNAA License (Windows Server 2003 Enterprise</b>, then enter username and password, and accept the license agreement.)</li></ul> | + | <li>'''Download URL:''' https://inside.senecacollege.ca/its/software/ https://inside.senecacollege.ca/its/software/]<br /> (Select '''Software Access''' -> '''Software Downloads''' -> '''MSDN''')<br />(Select <b>Downloads</b>, then select <b>MSDN</b> and log in with your user name and password. Download a key for the product , using same URL as above, then select <b>MSDNAA License (Windows Server 2003 Enterprise</b>, then enter username and password, and accept the license agreement.)</li></ul> |
| <ul> | | <ul> |
| <li>[[Download and Burn Image in TEL Open Lab]]</li> | | <li>[[Download and Burn Image in TEL Open Lab]]</li> |
Revision as of 11:27, 9 September 2015
Welcome to SEC520 - Internet Security
What This Course is About
This subject explores issues surrounding web site construction, operation, and maintenance from a security point of view. Students will learn how to:
- List basic rules regarding Internet Security.
- Identify attack types from both internal and external sources.
- Conduct safe authorized Penetration Testing (creating and using Virtual Machines).
- Build secure servers from Penetration Testing Results ("hardened" servers).
Major topics will include document encryption, server protection, and defense strategies.
Demonstration web servers for both Windows and Unix/Linux will be investigated during this one semester course.
Course Resources
Supplies Checklist (Required Prior to First Class)
Hardware
Item
|
Item Details
|
Graphic
|
SATA Hard Disk in Removable Drive Tray
|
There are a few different methods of setting up for the SEC520 lab:
- Use removable SATA Removable Hard Disk (Kali Linux host, VMs for other vulnerable OS
- Setup VirtualBox on existing Notebook/Netbook, and create VMs for Kali Linux, vulnerable Windows 2003 server, and vulnerable Linux server
- Full dedicated install on a Notebook/Netbook for Kali Linux, VMs to be installed for other vulnerable OS
Specification for SATA Hard Disk in Removable Drive Tray:
Hard Disk Size: at least 160GB (250 - 500 GB preferred). Please buy the tray from ACS or the bookstore as not all trays are compatible.
Mechanical shock from dropping a hard drive causes drive failure for several students each semester. If you use a mechanical hard drive, be careful not to drop it, and transport it in a padded container (e.g., a neoprene netbook sleeve, available from some dollar stores).
Solid state disks (SSDs) are becoming competitive in price, are faster, and are less susceptible to shock, so you may want to look for a deal on an SSD instead of a hard drive -- but check to ensure that your SSD will fit properly into your drive tray.
Please tighten the drive screws securely to prevent the tray from jamming in the holder, or leave the screws off.
|
Hard Disk in Disk TrayAt least 160 GB (available at the Bookstore)
|
Bootable Operating System Images
Note: Although instructions are provided to burn OS for VMs on CD/DVD, there are other methods of installing OS on VMs: USB stick, network install, or by downloaded image file. You can determine the best method to use. Here is a link to installing a VM from saved image file: How to Run ISO Image File in VirtualBox
Storage Media
|
Download and Burning Options
|
Kali Linux CD:
Fedora Core 5 DVD:
Windows 2003 Server CD (Enterprise and Standard 32-bit):
|
USB keys to Installation Media (Alternative to CD/DVD)
|
Study Aids
Item
|
Item Details
|
Graphic
|
Lab Log-Book
|
Download and Print: SEC520 Lab log book [ PDF ] [ odt ].
Please note that you can use your log book during quizzes, written tests, practical tests and the final exam.
It's also the record that you have completed the labs, so don't lose it!
|
Lab Log-BookUsed for marking labs and for an evaluation aid
|
Important Information
You are Playing With Fire! "A little bit of knowledge is a dangerous thing". You MUST carefully read and follow instructions in your SEC520 labs as well as heeding warning from your SEC520 instructor. Failing to use caution when learning in this environment can cause damage to computer systems and cause your computer account(s) to be taken away.
Students will be required to "sign waivers" to promise to follow these rules carefully, and only perform certain operations in the computer lab indicated at the college.
Share / Collaborate Problems and Solutions with Others (non-evaluation issues only) Use the "lounge" section is Moodle to post concerns or solutions with other classmates regarding labs. The ability to collaborate with colleagues to solve problems instead of always asking your boss (or professor) is a very useful skill-set!
Place your Full Name and Contact Information on the hard disk tray cover and directly on the disk drive. Use an adhesive label and permanent marker, or a white marker on the black cover.
Always "double-check" that you have removabled your hard disk tray prior to exiting the lab room. You may have your hard drive tray stolen which will result in lost work!
Do not share your SEC520 disk drive with another course. The work you do in this course will render your other work inaccessible and may erase it.
Earlier labs become the foundation for later labs. Seemingly "small errors", or "skipping instructions" in earlier labs can have negative consequences when performing other dependent labs. Make backups when requested at the end of labs for "restoration points" in case something goes wrong while performing a lab.
Always shut down your system under software control, rather than using the reset or power buttons. You can shutdown using the GUI or with the poweroff , reboot , init , or shutdown commands. Shut down your virtual machines before shutting down your main system.
|
Course Faculty
During the Fall 2015 semester, SEC520 is taught by:
|
|
Wiki Participation
- You can edit these pages! Please feel free to fix typos or add links to additional resources. Please use this capability responsibly.
- Some simple math skills required for saving edits... >:)