- Week
|
- Objectives and Tasks
|
- Course Notes / Assigned Reading
|
- Labs
|
- Week 1
|
- Course Introduction:
- SEC520 WIKI
- Course Outline
- Course Policies
- Required Materials
- Lab Setup
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
- Reading References:
- Resources:
|
- Lab 1:
- Set-Up for Labs:
|
- Week 2
|
- Developing a "Security Mind":
- 4 Virtues of Internet Security
- 8 Rules of Internet Security
- Penetration Testing:
-
- Information Gathering
- Foot-printing
- User Information
- Verification
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
- Reading References:
- YouTube Videos:
|
- Lab 2:
- Pentration Testing:
|
- Week 3
|
- Scanning, Enumeration, & Vulnerability Testing:
- Penetration Testing (Continued):
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 3:
- Penetration Testing / Continued:
WARNINGS!- Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.
- Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server. Students must sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server
|
- Week 4
|
- Scanning, Enumeration, & Vulnerability Testing:
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
- [ odp ] [ pdf ] [ ppt ] Interpreting and Respecting the Rules for the Tank Server
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 3:
- Continue Working on Lab 3
|
- Week 5
|
- System Hardening in Linux:
- Purpose
- Rule of Preventative Action
- Rule of Separation
- Rule of Least Privilege
- AAA Protocol (Authentication):
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 1)
- Reading References:
- YouTube Videos:
-
- Part1 | Part 2 | Part 3
- Resources:
|
- Lab 4:
- System Hardening
- Assignment #1 Posted:
|
- Week 6
|
- Midterm (Test #1) Review:
- Complete Labs 1 - 5
- Review for Midterm
|
|
- Lab 4:
- Continue Working on Lab 4
- Work on Assignment #1
|
- Week 7
|
- Midterm (Test #1):
|
|
|
Study Week
|
- Week 8
|
- System Hardening in Linux / Continued:
- AAA Protocol (Authorization):
- ACLs
- SELinux
- Sudo
- Cron Jobs
- Turning Off Xwindows
- Hardening Windows 2003 Server:
- Installing and Configuring Security Configuration Wizard
- Using New Technology File System (NTSF)
- Configuring Automatic Updates
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 2)
- YouTube Videos:
- Reading References:
- Resources:
- Slides (Concepts):
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 5:
- System Hardening
- Lab 7:
- Assignment #1 Due
|
- Week 9
|
- Types of Attacks:
-
- Phishing
- Webbrowser - Malicious Payloads
- IP Spoofing (Man in the Middle) / Password
- Out-dated Software Patches
- Database Injection
- Password Cracking
- Intrusion Detection:
- Purpose
- Logs
- Monitoring
- Iptables
- Using Tripwire
|
- Slides (Concepts):
- YouTube Videos:
- Reading References:
- Resources:
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Intrusion Detection / Using Tripwire
- Reading References:
- YouTube Videos:
- Additional Resources (for interest):
|
- Lab 6:
- Attack Categories:
WARNINGS!- Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.
- Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server. Students must sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server
- Lab 8:
- Assignment #2 Posted:
|
- Week 10
|
- Additional Considerations:
- Decoys: Honey-Pots
- DMZs
- Disaster Recovery
- The BIGGER Picture
|
- Slides:
- Reading References:
- YouTube Videos:
- Resources:
|
|
- Week 11
|
- Test #2:
|
|
|
- Week 12
|
- Assignment #2 Evaluation:
- Presentations
- Evaluate Secured System
|
|
- Assignment #2 Due:
|
- Week 13
|
- Final Exam Review
|
|
|
Exam Week - TBA
|