Difference between revisions of "SEC52O Weekly Schedule"
Line 47: | Line 47: | ||
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3)--> | <!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3)--> | ||
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)--> | <!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)--> | ||
− | + | ::* | |
:'''YouTube Videos:''' | :'''YouTube Videos:''' | ||
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance] | ::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance] | ||
Line 92: | Line 92: | ||
:'''Reading References:''' | :'''Reading References:''' | ||
<!-- DEAD LINK::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)--> | <!-- DEAD LINK::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)--> | ||
− | + | ::* | |
:'''YouTube Videos:''' | :'''YouTube Videos:''' | ||
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ||
Line 150: | Line 150: | ||
:'''Reading References:''' | :'''Reading References:''' | ||
<!-- DEAD LINK::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )--> | <!-- DEAD LINK::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )--> | ||
− | + | ::* | |
:'''YouTube Videos:''' | :'''YouTube Videos:''' | ||
::*Linux Hardening | ::*Linux Hardening | ||
Line 200: | Line 200: | ||
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )--> | <!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )--> | ||
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )--> | <!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )--> | ||
− | + | ::* | |
:'''Resources:''' | :'''Resources:''' | ||
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs] | ::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs] | ||
Line 292: | Line 292: | ||
:'''Reading References:''' | :'''Reading References:''' | ||
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)--> | <!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)--> | ||
− | + | ::* | |
| | | | ||
Line 332: | Line 332: | ||
:'''Reading References:''' | :'''Reading References:''' | ||
− | ::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: ) | + | <!--DEAD LINK::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )--> |
− | + | ::* | |
:'''YouTube Videos:''' | :'''YouTube Videos:''' | ||
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003] | ::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003] | ||
Line 371: | Line 371: | ||
:'''Reading References:''' | :'''Reading References:''' | ||
− | ::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux] | + | <!--::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]--> |
− | + | ::* | |
− | ::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: ) | + | <!--::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )--> |
:'''YouTube Videos:''' | :'''YouTube Videos:''' |
Revision as of 11:55, 1 February 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Study Week | |||
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
Exam Week - TBA |