Difference between revisions of "SEC520 Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
m (Protected "SEC520 Weekly Schedule": OER transfer ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
 
(119 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
[[Category:SEC520]]
 
[[Category:SEC520]]
  
 +
=SEC520 Weekly Schedule=
 +
== Winter 2018==
 +
::Instructor:<br />Austin (SAA)<br />Craig Barretto (craig.barretto@senecacollege.ca)
 +
1 credit
 +
::*Quiz and Labs ( 4 Quiz, 7 Labs (15%))
 +
::::'''Logbooks due April 10th, 2018'''
 +
::*Assignments (2) 20%
 +
::::'''Assignment 1 - Due Date March 9''''''
 +
::::'''Assignment 2 - Due Date TBA''''''
 +
::*Tests (2) 30%
 +
::::'''Written Test - March 8''''''
 +
::::'''Lab Test - March 15'''''
 +
::*Final Test 35%
 
{|width="100%" border="1" cellspacing="2"
 
{|width="100%" border="1" cellspacing="2"
 
| style="width: 10%;" |
 
| style="width: 10%;" |
Line 12: Line 25:
 
|- valign="top"
 
|- valign="top"
 
|
 
|
 +
 +
 
:'''Week 1'''
 
:'''Week 1'''
  
Line 23: Line 38:
 
::* Required Materials
 
::* Required Materials
 
::* Lab Setup
 
::* Lab Setup
 +
 +
 +
 +
 +
|
 +
 +
 +
:'''Slides (Concepts):'''
 +
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind"
 +
 +
 +
:'''Reading References:'''
 +
::* [http://lcweb.senecac.on.ca:2053/0596006691 Computer Security Basics (E-book)]<br />(Chapter 1: The New Insecurity)
 +
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)]  (Chapters 1 - 3)
 +
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)
 +
 +
 +
:'''Resources:'''
 +
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520  SEC520 WIKI]
 +
::* [https://scs.senecac.on.ca/course/sec520 Course Outline]
 +
 +
::*  Required Materials are listed in your Supplies Checklist. Other materials and references are noted week by week.
 +
 +
 +
|
 +
 +
 +
:'''Lab 1:'''
 +
::Set-Up for Labs:
 +
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs]
 +
 +
 +
|-  valign="top"
 +
|
 +
 +
 +
:'''Week 2'''
 +
 +
|
  
  
Line 34: Line 88:
 
::::*User Information
 
::::*User Information
 
::::*Verification
 
::::*Verification
 +
 +
  
 
|
 
|
Line 39: Line 95:
  
 
:'''Slides (Concepts):'''
 
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind"
 
 
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.ppt ppt] ] Penetration Testing: Reconnaissance
 
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.ppt ppt] ] Penetration Testing: Reconnaissance
  
Line 49: Line 104:
 
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance]
 
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance]
  
:'''Resources:'''
 
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520  SEC520 WIKI]
 
::* [https://scs.senecac.on.ca/course/sec520 Course Outline]
 
::* [https://cs.senecac.on.ca/~scs/DonMillsPolicies/policy.html Course Policies]
 
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520#Supplies_Checklist_.28Required_for_Second_Class.29 Required Materials]
 
  
 
|
 
|
  
 
:'''Lab 1:'''
 
::Set-Up for Labs:
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs]
 
  
 
:'''Lab 2:'''
 
:'''Lab 2:'''
 
::Pentration Testing:
 
::Pentration Testing:
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_2.html Reconnaissance]
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_2.html Reconnaissance]
 +
 +
 +
 
|-  valign="top"
 
|-  valign="top"
 
|
 
|
:'''Week 2'''
+
 
 +
 
 +
:'''Week 3'''
  
 
|
 
|
Line 84: Line 135:
 
:'''Slides (Concepts):'''
 
:'''Slides (Concepts):'''
 
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ]  Scanning & Enumeration
 
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ]  Scanning & Enumeration
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ]  Vulnerability Testing
+
 
::* [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.odp odp] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.pdf pdf] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.ppt ppt] ]  Interpreting and Respecting the Rules for the Tank Server
 
  
 
:'''Reading References:'''
 
:'''Reading References:'''
Line 93: Line 143:
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration]
 
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration]
::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview]
+
::*[https://pentest-tools.com/network-vulnerability-scanning/tcp-port-scanner-online-nmap Online Pen-Test Scanner]
::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus]
+
::*[https://www.youtube.com/watch?v=dR7NTYfmNcA Prep for Metasploit]
::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)]
 
  
 
:'''Resources:'''
 
:'''Resources:'''
 
::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports)
 
::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports)
::*[http://www.commonexploits.com/?p=243 Using Armitage] (Metasploit Framework)
+
 
  
 
|
 
|
Line 106: Line 155:
 
:'''Lab 3:'''
 
:'''Lab 3:'''
 
::Penetration Testing / Continued:
 
::Penetration Testing / Continued:
 +
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_3.html Scanning, Enumeration, & Vulnerability Testing]
 +
 +
 +
 
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
 
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
 
<div style="float: left; margin-left: -40px;"></div>
 
<div style="float: left; margin-left: -40px;"></div>
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
+
 
 
</div>
 
</div>
  
  
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_3.html Scanning, Enumeration, & Vulnerability Testing]
+
 
 +
|- valign="top"
 +
|
  
  
:'''Assignment #1 Posted:'''
+
:'''Week 4'''
::*Details: N/A
 
  
  
|-  valign="top"
 
 
|
 
|
:'''Week 3'''
 
  
|
 
  
 +
:'''Scanning, Enumeration, & Vulnerability Testing:'''
 +
::*Vulnerability Testing
  
:'''System Hardening in Linux:'''
 
::*Purpose
 
::*Rule of Preventative Action
 
::*Rule of Separation
 
::*Rule of Least Privilege
 
:::*AAA Protocol (Authentication):
 
::::*PKI
 
::::*PAM
 
::::*Kerebos
 
  
 
|
 
|
Line 140: Line 184:
  
 
:'''Slides (Concepts):'''
 
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Linux Hardening (part 1)
+
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing
 +
 
  
 
:'''Reading References:'''
 
:'''Reading References:'''
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
+
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)
  
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
::*Linux Hardening
+
::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview]
:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
+
::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus]
::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
+
::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)]
  
 
:'''Resources:'''
 
:'''Resources:'''
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
+
::*[https://www.youtube.com/watch?v=r4Qq2eVjiP0 Setting up the Metasploit database]
 +
::*[https://www.youtube.com/watch?v=x01ZErjNlX0 First Metasploit Payload]
 +
::*[http://www.youtube.com/watch?v=jJd5qg3fkyw Using Armitage] (Metasploit Framework)]
 +
 
  
 
|
 
|
  
  
 +
:'''Lab 3:'''
 +
::Continue Working on '''Lab 3'''
  
:'''Lab 4:'''
 
::System Hardening
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Linux System Hardening (part 1)]
 
  
  
 +
|- valign="top"
 +
|
  
|- valign="top"
+
 +
:'''Week 5'''
 
|
 
|
:'''Week 4'''
 
  
  
|
+
:'''Types of Attacks:'''
 +
::*Client-side Attacks
 +
:::*Phishing
 +
:::*Webbrowser - Malicious Payloads
 +
:::*IP Spoofing (Man in the Middle) / Password
 +
::*Server-side Attacks
 +
:::*Out-dated Software Patches
 +
:::*Database Injection
 +
:::*Password Cracking
  
  
:'''System Hardening in Linux / Continued:'''
 
::*AAA Protocol (Authorization):
 
:::*ACLs
 
:::*SELinux
 
:::*Sudo
 
:::*Cron Jobs
 
:::*Turning Off Xwindows
 
  
 
|
 
|
Line 183: Line 233:
  
 
:'''Slides (Concepts):'''
 
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.ppt ppt] ] Linux Hardening (part 2)
+
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.ppt ppt] ] Types of Attacks
  
 
:'''YouTube Videos:'''
 
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=6piQXXHTmqk ACLs]
+
::*[http://www.youtube.com/watch?v=ZUygX8TBBw0 Phishing]
::*[http://www.youtube.com/watch?v=fpXuWhshKVA SELinux]
+
::*[http://www.youtube.com/watch?v=PqfZM3Lxrmg Malicious Payload]
::*[http://www.youtube.com/watch?v=imnEUvvDxc4 Sudo]
+
::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing]
::*[http://www.youtube.com/watch?v=4Icg3MYZZqI Cron Jobs]
+
::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection]
 +
::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking]
  
 
:'''Reading References:'''
 
:'''Reading References:'''
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )
+
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)
::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )
 
  
 
:'''Resources:'''
 
:'''Resources:'''
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
+
 
::* SELinux
+
::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System)
::* [http://www.sudo.ws/sudo/intro.html Sudo In a Nutshell]
+
::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)]
|
+
::*[https://github.com/WebGoat/WebGoat/wiki Webgoat]
  
  
:'''Lab 5:'''
 
::System Hardening
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_5.html Linux System Hardening (part 2)]
 
  
|- valign="top"
 
 
|
 
|
:'''Week 5'''
 
  
  
|
+
:'''Lab 4:'''
 +
:Attack Categories:
 +
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Types of Attacks]
 +
 
  
 +
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
 +
<div style="float: left; margin-left: -40px;"></div>
 +
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.<br /><br /></ol></div>
 +
</div>
  
:'''Midterm (Test #1) Review:'''
 
::*Complete Labs 1 - 5
 
::*Submit Assignment #1
 
::*Review for Midterm
 
  
  
 +
|- valign="top"
 
|
 
|
  
  
 +
:'''Week 6'''
 +
 +
More on mysql injection and Webgoat
  
 
|
 
|
  
  
:'''Assignment #1 Submitted:'''
+
::* [[https://www.youtube.com/watch?v=Rqt_BgG5YyI Blind MySQL injection video]]
::* [https://scs.senecac.on.ca/~fac/sec520/assignments/SEC520_Assignment_1.html Assignment Submission Instructions]
+
'''Moved until after the break'''
 +
:'''Hardening Windows 7/8/10'''
 +
::*Installing and Configuring Security Configuration Wizard
 +
::*Using New Technology File System (NTSF)
 +
::*Configuring Automatic Updates
 +
 
 +
:'''Test #1: Details, March 6th'''
 +
::# Quiz 2 (February  22)
 +
 
  
|- valign="top"
 
 
|
 
|
:'''Week 6'''
 
  
  
|
+
:'''Slides (Concepts):'''
 +
 
 +
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [  [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Hardening - Basic Concepts
 +
::* [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pptx pptx] ]  Hardening Windows
 +
 
 +
:'''Reading References:'''
 +
::*[https://www.sans.org/media/score/checklists/ID-Windows.pdf Intrusion Discovery - Windows]
 +
::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )
 +
::* [http://old.honeynet.org/papers/enemy/ "Know Your Enemy: The Script Kiddie"]
  
 +
:'''YouTube Videos:'''
 +
::*[]
  
:'''Midterm (Test #1):'''
+
:'''Resources:'''
::*Test Details
+
::*
  
  
Line 246: Line 314:
  
  
|
 
  
 +
 +
:'''Assignment #1:'''
 +
::* Assignment Instructions (N/A)
 +
::Continue working on '''Lab 4''' and install Webgoat
  
  
Line 253: Line 324:
 
|
 
|
 
   
 
   
 +
 
:'''Week 7'''
 
:'''Week 7'''
  
Line 259: Line 331:
  
  
:'''Types of Attacks:'''
+
:'''Midterm (Test #1 March 6th):'''
::*Client-side Attacks
+
::*(Check course announcements for test details)
:::*Phishing
 
:::*Webbrowser - Malicious Payloads
 
:::*IP Spoofing (Man in the Middle) / Password
 
::*Server-side Attacks
 
:::*Out-dated Software Patches
 
:::*Database Injection
 
:::*Password Cracking
 
  
  
Line 273: Line 338:
  
  
:'''Slides (Concepts):'''
 
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.ppt ppt] ]  Types of Attacks
 
  
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=ZUygX8TBBw0 Phishing]
 
::*[http://www.youtube.com/watch?v=PqfZM3Lxrmg Malicious Payload]
 
::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing]
 
::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection]
 
::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking]
 
  
:'''Reading References:'''
+
|
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)
+
 
 +
 
 +
:'''Additional Tasks:'''
 +
:'''Lab 5:'''
 +
::*'''Hardening Windows 7/8/10'''
 +
::Work on '''Assignment #1'''
  
:'''Resources:'''
+
|- valign="center"
 +
!colspan="4"|<br />'''Study Week'''
  
::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System)
 
::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)]
 
  
 +
|- valign="top"
 
|
 
|
  
  
:'''Lab 6:'''
+
:'''Week 8'''
:'''Attack Categories:'''
 
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
 
<div style="float: left; margin-left: -40px;"></div>
 
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
 
</div>
 
  
  
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_6.html Types of Attacks]
+
|
  
  
 +
:'''Types of Penetration Testing'''
 +
::*Network
 +
::*Access Control
 +
::*Infrastructure / Patching
 +
::*Physical/Building Security
 +
::*Social Engineering
  
 +
|
  
  
|- valign="center"
+
:'''Slides (Concepts): See Blackboard'''
!colspan="4"|'''Study Week'''
 
|- valign="top"
 
|
 
  
 
:'''Week 8'''
 
|
 
  
  
:'''Hardening Windows 2003 Server:'''
 
::*Installing and Configuring Security Configuration Wizard
 
::*Using New Technology File System (NTSF)
 
::*Configuring Automatic Updates
 
  
 
|
 
|
  
  
:'''Slides (Concepts):'''
+
:'''Lab 6:'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w8_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w8_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w8_l1.ppt ppt] ]  Hardening Windows
+
::Work on vulnerable Windows 7 VM CTF
  
:'''Reading References:'''
 
::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )
 
  
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003]
 
  
:'''Resources:'''
 
::*
 
|
 
  
  
:'''Lab 7:'''
+
:'''Assignment #1 Due'''
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_7.html Hardening Windows 2003 Server]
 
  
  
Line 352: Line 398:
  
  
:'''Intrusion Detection:'''
+
:'''Passwords, Pwn'ing, & Pillaging'''
::*Purpose
+
 
::*Logs
 
::*Monitoring
 
::*Iptables
 
::*Using Tripwire
 
  
  
Line 364: Line 406:
  
  
:'''Slides (Concepts):'''
+
:'''Slides (Concepts): See Blackboard'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.ppt ppt] ]  Intrusion Detection / Using Tripwire
+
 
 +
 
  
:'''Reading References:'''
 
::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
 
  
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
 
  
:'''YouTube Videos:'''
 
::*[http://www.youtube.com/watch?v=kUdCsZpt2ew Iptables]
 
  
:'''Additional Resources (for interest):'''
 
::*[http://www.sans.org/score/checklists/ID_Windows.pdf Intrusion Discovery - Windows]
 
 
|
 
|
 +
 +
:'''Lab 7:'''
 +
::Continue to work on vulnerable Windows 7 VM CTF
  
  
:'''Lab 8:'''
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_8.html Intrusion Detection]
 
  
:'''Assignment #2 Posted:'''
 
::*Details - N/A
 
 
|- valign="top"
 
|- valign="top"
 
|
 
|
Line 392: Line 427:
  
  
:'''Additional Considerations:'''
+
:'''Metasploit and Metasploitable 2'''
::*Decoys: Honey-Pots
+
 
::*DMZs
+
 
::*Disaster Recovery
+
 
::*The BIGGER Picture
 
 
|
 
|
  
  
:'''Slides:'''
 
::* <div style="background:#ffff00">[odp] [pdf] [ppt] Additional Considerations</div>
 
  
:'''Reading References:'''
 
::*
 
  
:'''YouTube Videos:'''
 
::*
 
  
:'''Resources:'''
+
 
::*
 
 
|
 
|
  
 +
 +
:'''Labs:'''
  
  
Line 419: Line 448:
 
|
 
|
 
:'''Week 11'''
 
:'''Week 11'''
 
  
 
|
 
|
  
 
:'''Test #2:'''
 
::*Test Details
 
  
  
Line 434: Line 459:
  
  
<!-- * SELinux and httpd -->
 
 
|
 
|
 +
 +
 +
 +
:'''Lab 8:'''
  
  
Line 446: Line 474:
  
  
:'''Assignment #2 Evaluation:'''
+
:'''Work on Assignment #2'''
::*Presentations
+
::*Complete Report
::*Evaluate Secured System
+
 
 
|
 
|
  
 
|
 
|
 
:'''Assignment #2 Due:'''
 
:'''Assignment #2 Due:'''
::* Assignment Submission Instructions
+
 
  
 
|- valign="top"
 
|- valign="top"

Latest revision as of 14:57, 21 July 2023


SEC520 Weekly Schedule

Winter 2018

Instructor:
Austin (SAA)
Craig Barretto (craig.barretto@senecacollege.ca)

1 credit

  • Quiz and Labs ( 4 Quiz, 7 Labs (15%))
Logbooks due April 10th, 2018
  • Assignments (2) 20%
Assignment 1 - Due Date March 9'
Assignment 2 - Due Date TBA'
  • Tests (2) 30%
Written Test - March 8'
Lab Test - March 15
  • Final Test 35%
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs


Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup




Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"


Reading References:


Resources:
  • Required Materials are listed in your Supplies Checklist. Other materials and references are noted week by week.



Lab 1:
Set-Up for Labs:



Week 2


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:



Lab 2:
Pentration Testing:



Week 3


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration


Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:




Week 4



Scanning, Enumeration, & Vulnerability Testing:
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing


Reading References:
YouTube Videos:
Resources:



Lab 3:
Continue Working on Lab 3



Week 5


Types of Attacks:
  • Client-side Attacks
  • Phishing
  • Webbrowser - Malicious Payloads
  • IP Spoofing (Man in the Middle) / Password
  • Server-side Attacks
  • Out-dated Software Patches
  • Database Injection
  • Password Cracking



Slides (Concepts):
YouTube Videos:
Reading References:
Resources:



Lab 4:
Attack Categories:


WARNINGS!
  1. Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.



Week 6

More on mysql injection and Webgoat


Moved until after the break

Hardening Windows 7/8/10
  • Installing and Configuring Security Configuration Wizard
  • Using New Technology File System (NTSF)
  • Configuring Automatic Updates
Test #1: Details, March 6th
  1. Quiz 2 (February 22)



Slides (Concepts):
Reading References:
YouTube Videos:
  • []
Resources:




Assignment #1:
  • Assignment Instructions (N/A)
Continue working on Lab 4 and install Webgoat



Week 7



Midterm (Test #1 March 6th):
  • (Check course announcements for test details)





Additional Tasks:
Lab 5:
  • Hardening Windows 7/8/10
Work on Assignment #1

Study Week



Week 8



Types of Penetration Testing
  • Network
  • Access Control
  • Infrastructure / Patching
  • Physical/Building Security
  • Social Engineering


Slides (Concepts): See Blackboard




Lab 6:
Work on vulnerable Windows 7 VM CTF



Assignment #1 Due



Week 9


Passwords, Pwn'ing, & Pillaging




Slides (Concepts): See Blackboard




Lab 7:
Continue to work on vulnerable Windows 7 VM CTF


Week 10


Metasploit and Metasploitable 2






Labs:


Week 11





Lab 8:


Week 12



Work on Assignment #2
  • Complete Report
Assignment #2 Due:



Week 13



Final Exam Review
  • Details



Exam Week - TBA