Difference between revisions of "SEC520 Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
(SEC520 Weekly Schedule)
(Winter 2018)
Line 8: Line 8:
 
::*Assignments (2) 20%
 
::*Assignments (2) 20%
 
::*Tests (2) 30%
 
::*Tests (2) 30%
::*Final Test 25%
+
::*Final Test 35%
 
{|width="100%" border="1" cellspacing="2"
 
{|width="100%" border="1" cellspacing="2"
 
| style="width: 10%;" |
 
| style="width: 10%;" |

Revision as of 14:29, 13 February 2018


SEC520 Weekly Schedule

Winter 2018

Instructor:
Austin (SAA)

1 credit

  • Quiz and Labs ( 4 Quiz, 7 Labs (15%))
  • Assignments (2) 20%
  • Tests (2) 30%
  • Final Test 35%
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs


Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup




Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"


Reading References:


Resources:



Lab 1:
Set-Up for Labs:



Week 2


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:



Lab 2:
Pentration Testing:



Week 3


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration


Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:




Week 4



Scanning, Enumeration, & Vulnerability Testing:
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing


Reading References:
YouTube Videos:
Resources:



Lab 3:
Continue Working on Lab 3



Week 5


Types of Attacks:
  • Client-side Attacks
  • Phishing
  • Webbrowser - Malicious Payloads
  • IP Spoofing (Man in the Middle) / Password
  • Server-side Attacks
  • Out-dated Software Patches
  • Database Injection
  • Password Cracking



Slides (Concepts):
YouTube Videos:
Reading References:
Resources:



Lab 4:
Attack Categories:


WARNINGS!
  1. Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.



Week 6



Hardening Windows 7/8/10
  • Installing and Configuring Security Configuration Wizard
  • Using New Technology File System (NTSF)
  • Configuring Automatic Updates
Test #1: Details, March 6th
  1. Quiz 2 (February 22)
Continue working on Lab 4


Slides (Concepts):
Reading References:
YouTube Videos:
  • []
Resources:




Assignment #1:
  • Assignment Instructions (N/A)



Week 7



Midterm (Test #1 March 6th):
  • (Check course announcements for test details)





Additional Tasks:
Lab 5:
  • Hardening Windows 7/8/10
Continue working on Lab 5
Work on Assignment #1

Study Week



Week 8



System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authentication):
  • PKI
  • PAM
  • Kerebos



Slides (Concepts):
Reading References:
YouTube Videos:
  • Linux Hardening
Part1 | Part 2 | Part 3
Resources:



Lab 6:
System Hardening



Assignment #1 Due



Week 9


System Hardening in Linux / Continued:
  • AAA Protocol (Authorization):
  • ACLs
  • SELinux
  • Sudo
  • Cron Jobs
  • Turning Off Xwindows



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening - Part 2
YouTube Videos:
Reading References:
Resources:



Lab 7:
System Hardening


Assignment #2:
  • Assignment Instructions (N/A)


Week 10


System Hardening in Linux / Continued:
  • Complete Labs 6 and 7






Labs:
  • Complete Labs 6 and 7


Week 11


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring
  • Iptables
  • Using Tripwire


Additional Considerations:
  • Decoys: Honey-Pots
  • DMZs
  • Disaster Recovery
  • The BIGGER Picture


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Intrusion Detection / Using Tripwire
Reading References:
YouTube Videos:
Additional Resources:



Lab 8:
Week 12



Work on Assignment #2
  • Complete Report
Assignment #2 Due:



Week 13



Final Exam Review
  • Details



Exam Week - TBA