Difference between revisions of "SEC520 Weekly Schedule"

From CDOT Wiki
Jump to: navigation, search
Line 294: Line 294:
 
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
 
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
 
</div>
 
</div>
 +
  
  
Line 304: Line 305:
  
  
:'''Week 5'''
+
:'''Week 6'''
  
  
Line 310: Line 311:
  
  
:'''System Hardening in Linux:'''
+
 
::*Purpose
+
:'''Midterm (Test #1) Review:'''
::*Rule of Preventative Action
+
::*Complete Labs 1 - 5
::*Rule of Separation
+
::*Review for Midterm
::*Rule of Least Privilege
 
:::*AAA Protocol (Authentication):
 
::::*PKI
 
::::*PAM
 
::::*Kerebos
 
  
  
Line 324: Line 320:
  
  
:'''Slides (Concepts):'''
 
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [  [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Linux Hardening (part 1)
 
  
:'''Reading References:'''
+
|
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
 
  
:'''YouTube Videos:'''
 
::*Linux Hardening
 
:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
 
::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
 
  
:'''Resources:'''
+
:'''Lab 4:'''
::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
+
::Continue Working on '''Lab 4'''
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
+
::Work on '''Assignment #1'''
  
  
 +
|- valign="top"
 
|
 
|
 +
  
 
+
:'''Week 7'''
:'''Lab 4:'''
 
::System Hardening
 
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Linux System Hardening (part 1)]
 
  
  
 
|- valign="top"
 
 
|
 
|
  
  
:'''Week 6'''
+
:'''Midterm (Test #1):'''
 +
::*(Check course announcements for test details)
  
  
Line 359: Line 346:
  
  
 
:'''Midterm (Test #1) Review:'''
 
::*Complete Labs 1 - 5
 
::*Review for Midterm
 
  
  
Line 369: Line 352:
  
  
|
 
  
 +
|- valign="center"
 +
!colspan="4"|'''Study Week'''
  
:'''Lab 4:'''
 
::Continue Working on '''Lab 4'''
 
::Work on '''Assignment #1'''
 
  
  
 
|- valign="top"
 
|- valign="top"
 
|
 
|
 
  
:'''Week 7'''
+
 
 +
:'''Week 5'''
  
  
Line 387: Line 368:
  
  
:'''Midterm (Test #1):'''
+
:'''System Hardening in Linux:'''
::*(Check course announcements for test details)
+
::*Purpose
 +
::*Rule of Preventative Action
 +
::*Rule of Separation
 +
::*Rule of Least Privilege
 +
:::*AAA Protocol (Authentication):
 +
::::*PKI
 +
::::*PAM
 +
::::*Kerebos
  
  
Line 394: Line 382:
  
  
 +
:'''Slides (Concepts):'''
 +
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [  [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Linux Hardening (part 1)
 +
 +
:'''Reading References:'''
 +
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
 +
 +
:'''YouTube Videos:'''
 +
::*Linux Hardening
 +
:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
 +
::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
 +
 +
:'''Resources:'''
 +
::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
 +
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
  
  
 
|
 
|
  
 +
 +
:'''Lab 4:'''
 +
::System Hardening
 +
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Linux System Hardening (part 1)]
  
  
  
|- valign="center"
 
!colspan="4"|'''Study Week'''
 
 
|- valign="top"
 
|- valign="top"
 
|
 
|

Revision as of 09:18, 2 January 2013


Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs


Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup




Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"


Reading References:


Resources:



Lab 1:
Set-Up for Labs:



Week 2


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:



Lab 2:
Pentration Testing:



Week 3


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration


Reading References:
YouTube Videos:


Resources:



Lab 3:
Penetration Testing / Continued:


WARNINGS!
  1. Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.

  2. Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server. Students must sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server



Week 4



Scanning, Enumeration, & Vulnerability Testing:
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
  • [ odp ] [ pdf ] [ ppt ] Interpreting and Respecting the Rules for the Tank Server
Reading References:
YouTube Videos:
Resources:



Lab 3:
Continue Working on Lab 3




Week 5



Hardening Windows 2003 Server:
  • Installing and Configuring Security Configuration Wizard
  • Using New Technology File System (NTSF)
  • Configuring Automatic Updates
Test #2:
  • Test Details



Slides (Concepts):
Reading References:
YouTube Videos:
Resources:



Lab 4:
Assignment #1 Posted:
  • Assignment Instructions (N/A)


Week 6


Types of Attacks:
  • Client-side Attacks
  • Phishing
  • Webbrowser - Malicious Payloads
  • IP Spoofing (Man in the Middle) / Password
  • Server-side Attacks
  • Out-dated Software Patches
  • Database Injection
  • Password Cracking



Slides (Concepts):
YouTube Videos:
Reading References:
Resources:



Lab 5:
Attack Categories:


WARNINGS!
  1. Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.

  2. Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server. Students must sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server





Week 6



Midterm (Test #1) Review:
  • Complete Labs 1 - 5
  • Review for Midterm




Lab 4:
Continue Working on Lab 4
Work on Assignment #1



Week 7



Midterm (Test #1):
  • (Check course announcements for test details)






Study Week



Week 5



System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authentication):
  • PKI
  • PAM
  • Kerebos



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 1)
Reading References:
YouTube Videos:
  • Linux Hardening
Part1 | Part 2 | Part 3
Resources:



Lab 4:
System Hardening



Week 8


System Hardening in Linux / Continued:
  • AAA Protocol (Authorization):
  • ACLs
  • SELinux
  • Sudo
  • Cron Jobs
  • Turning Off Xwindows



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 2)
YouTube Videos:
Reading References:
Resources:



Lab 5:
System Hardening


Assignment #1 Due


Assignment #2 Posted:


Week 10


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring
  • Iptables
  • Using Tripwire


Additional Considerations:
  • Decoys: Honey-Pots
  • DMZs
  • Disaster Recovery
  • The BIGGER Picture


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Intrusion Detection / Using Tripwire
Reading References:
YouTube Videos:
Additional Resources:



Lab 7:


Week 12



Work on Assignment #2
  • Complete Report
Assignment #2 Due:



Week 13



Final Exam Review
  • Details



Exam Week - TBA