Difference between revisions of "SEC52O Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
Line 134: Line 134:
 
:'''System Hardening in Linux:'''
 
:'''System Hardening in Linux:'''
 
::*Purpose of System Hardening
 
::*Purpose of System Hardening
::*Internet Security Rules:
+
::*Rule of Separation
:::*Rule of Separation
+
:::*Separate Servers, turn-off open ports, AAA Protocol (Authorization, Authentication, Accounting)
::::*Separate Servers, turn-off open ports, AAA Protocol (Authorization, Authentication, Accounting)
+
::*Rule of Preventative Action
:::*Rule of Preventative Action
+
::*Rule of Least Priviledge / Rule of Trust
:::*Rule of Least Priviledge / Rule of Trust
+
:::*Password Policies
::::*Password Policies
+
:::*Cron Jobs
::::*Cron Jobs
+
:::*SELinux
::::*SELinux
+
:::*Sudo
::::*Sudo
+
:::*Iptables
::::*Iptables
 
 
|
 
|
  

Revision as of 08:10, 8 June 2012

Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing
  • Client-side Attacks:
  • Human-side Errors
  • Operating System / Applications (Metasploit)
  • Phishing
  • Social Networking


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:
  • Details: N/A


Week 3


System Hardening in Linux:
  • Purpose of System Hardening
  • Rule of Separation
  • Separate Servers, turn-off open ports, AAA Protocol (Authorization, Authentication, Accounting)
  • Rule of Preventative Action
  • Rule of Least Priviledge / Rule of Trust
  • Password Policies
  • Cron Jobs
  • SELinux
  • Sudo
  • Iptables


Slides (Concepts):
  • [odp] [pdf] [ppt] System Hardening
  • [odp] [pdf] [ppt] Authentication, Authorization, Accounting (AAA Protocol)
Reading References:
YouTube Videos:
Resources:


Lab 4:
Linux System Hardening (Part 1)


Week 4



System Hardening in Linux / Continued:
  • Iptables
  • SELinux
  • Sudo


Slides (Concepts):
  • [odp] [pdf] [ppt] Iptables & SSH
  • [odp] [pdf] [ppt] SELinux & Sudo
YouTube Videos:
Reading References:
Resources:


Lab 5:
Linux System Hardening (Part 2)
Week 5



Midterm (Test #1 )Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Network-Side Attacks:
  • Database Services
  • TCP Stacks
  • Web Server / Web Applications


Slides (Concepts):
  • [odp] [pdf] [ppt] Network-Side Attacks
Reading References:
  • x
YouTube Videos:
Resources:


Lab 6:



Study Week


Week 8


Hardening Windows:
  • Hardening Windows Systems


Slides (Concepts):
  • [odp] [pdf] [ppt] Hardening Windows


Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection (Linux / Windows):
  • Purpose
  • Logs
  • Monitoring
  • Using Tripwire



Slides (Concepts):
  • [odp] [pdf] [ppt] Intrusion Detection / Using Tripwire


Reading References:
YouTube Videos:
Resources:


Lab 8:
Assignment #2 Posted:
  • Details - N/A
Week 10


Additional Considerations:
  • Decoys: Honeypots
  • Packet Sniffers
  • Malware
  • Trojan Horses


Slides:

  • [odp] [pdf] [ppt] Securing the Perimeter
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13


Final Exam Review

  • Details



Exam Week - TBA