Difference between revisions of "SEC520 Weekly Schedule"
m (Protected "SEC520 Weekly Schedule": OER transfer ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
|||
(102 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
[[Category:SEC520]] | [[Category:SEC520]] | ||
+ | =SEC520 Weekly Schedule= | ||
+ | == Winter 2018== | ||
+ | ::Instructor:<br />Austin (SAA)<br />Craig Barretto (craig.barretto@senecacollege.ca) | ||
+ | 1 credit | ||
+ | ::*Quiz and Labs ( 4 Quiz, 7 Labs (15%)) | ||
+ | ::::'''Logbooks due April 10th, 2018''' | ||
+ | ::*Assignments (2) 20% | ||
+ | ::::'''Assignment 1 - Due Date March 9'''''' | ||
+ | ::::'''Assignment 2 - Due Date TBA'''''' | ||
+ | ::*Tests (2) 30% | ||
+ | ::::'''Written Test - March 8'''''' | ||
+ | ::::'''Lab Test - March 15''''' | ||
+ | ::*Final Test 35% | ||
{|width="100%" border="1" cellspacing="2" | {|width="100%" border="1" cellspacing="2" | ||
| style="width: 10%;" | | | style="width: 10%;" | | ||
Line 12: | Line 25: | ||
|- valign="top" | |- valign="top" | ||
| | | | ||
+ | |||
+ | |||
:'''Week 1''' | :'''Week 1''' | ||
Line 25: | Line 40: | ||
− | + | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| | | | ||
Line 40: | Line 47: | ||
:'''Slides (Concepts):''' | :'''Slides (Concepts):''' | ||
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind" | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind" | ||
− | + | ||
:'''Reading References:''' | :'''Reading References:''' | ||
+ | ::* [http://lcweb.senecac.on.ca:2053/0596006691 Computer Security Basics (E-book)]<br />(Chapter 1: The New Insecurity) | ||
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3) | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3) | ||
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance) | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance) | ||
− | |||
− | |||
:'''Resources:''' | :'''Resources:''' | ||
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520 SEC520 WIKI] | ::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520 SEC520 WIKI] | ||
::* [https://scs.senecac.on.ca/course/sec520 Course Outline] | ::* [https://scs.senecac.on.ca/course/sec520 Course Outline] | ||
− | ::* | + | |
− | + | ::* Required Materials are listed in your Supplies Checklist. Other materials and references are noted week by week. | |
+ | |||
| | | | ||
Line 62: | Line 69: | ||
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs] | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs] | ||
− | + | ||
− | |||
− | |||
|- valign="top" | |- valign="top" | ||
| | | | ||
+ | |||
+ | |||
:'''Week 2''' | :'''Week 2''' | ||
Line 72: | Line 79: | ||
+ | : '''Developing a "Security Mind":''' | ||
+ | ::*4 Virtues of Internet Security | ||
+ | ::*8 Rules of Internet Security | ||
+ | ::*Penetration Testing: | ||
+ | :::*Reconnaissance: | ||
+ | ::::*Information Gathering | ||
+ | ::::*Foot-printing | ||
+ | ::::*User Information | ||
+ | ::::*Verification | ||
Line 78: | Line 94: | ||
+ | :'''Slides (Concepts):''' | ||
+ | ::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.ppt ppt] ] Penetration Testing: Reconnaissance | ||
+ | :'''Reading References:''' | ||
+ | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3) | ||
+ | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance) | ||
− | + | :'''YouTube Videos:''' | |
− | + | ::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance] | |
− | |||
− | |||
− | |||
| | | | ||
− | |||
− | |||
+ | :'''Lab 2:''' | ||
+ | ::Pentration Testing: | ||
+ | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_2.html Reconnaissance] | ||
+ | |- valign="top" | ||
| | | | ||
+ | :'''Week 3''' | ||
| | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
:'''Scanning, Enumeration, & Vulnerability Testing:''' | :'''Scanning, Enumeration, & Vulnerability Testing:''' | ||
Line 122: | Line 131: | ||
| | | | ||
+ | |||
:'''Slides (Concepts):''' | :'''Slides (Concepts):''' | ||
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration | ||
− | + | ||
− | |||
:'''Reading References:''' | :'''Reading References:''' | ||
Line 134: | Line 143: | ||
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ||
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration] | ::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration] | ||
− | ::*[https:// | + | ::*[https://pentest-tools.com/network-vulnerability-scanning/tcp-port-scanner-online-nmap Online Pen-Test Scanner] |
− | + | ::*[https://www.youtube.com/watch?v=dR7NTYfmNcA Prep for Metasploit] | |
− | ::*[https://www.youtube.com/watch?v= | ||
:'''Resources:''' | :'''Resources:''' | ||
::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports) | ::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports) | ||
− | + | ||
| | | | ||
+ | |||
:'''Lab 3:''' | :'''Lab 3:''' | ||
Line 152: | Line 161: | ||
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;"> | <div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;"> | ||
<div style="float: left; margin-left: -40px;"></div> | <div style="float: left; margin-left: -40px;"></div> | ||
− | + | ||
</div> | </div> | ||
Line 159: | Line 168: | ||
|- valign="top" | |- valign="top" | ||
| | | | ||
− | :'''Week | + | |
+ | |||
+ | :'''Week 4''' | ||
| | | | ||
− | :''' | + | |
− | ::* | + | :'''Scanning, Enumeration, & Vulnerability Testing:''' |
− | + | ::*Vulnerability Testing | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| | | | ||
+ | |||
:'''Slides (Concepts):''' | :'''Slides (Concepts):''' | ||
− | ::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/ | + | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing |
+ | |||
:'''Reading References:''' | :'''Reading References:''' | ||
− | ::*[http:// | + | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3) |
:'''YouTube Videos:''' | :'''YouTube Videos:''' | ||
− | ::* | + | ::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview] |
− | + | ::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus] | |
− | ::*[ | + | ::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)] |
:'''Resources:''' | :'''Resources:''' | ||
− | ::* [ | + | ::*[https://www.youtube.com/watch?v=r4Qq2eVjiP0 Setting up the Metasploit database] |
− | ::* [http://www. | + | ::*[https://www.youtube.com/watch?v=x01ZErjNlX0 First Metasploit Payload] |
+ | ::*[http://www.youtube.com/watch?v=jJd5qg3fkyw Using Armitage] (Metasploit Framework)] | ||
Line 196: | Line 204: | ||
− | :'''Lab | + | :'''Lab 3:''' |
− | :: | + | ::Continue Working on '''Lab 3''' |
− | + | ||
− | |||
− | |||
|- valign="top" | |- valign="top" | ||
| | | | ||
− | |||
− | |||
+ | |||
+ | :'''Week 5''' | ||
| | | | ||
+ | :'''Types of Attacks:''' | ||
+ | ::*Client-side Attacks | ||
+ | :::*Phishing | ||
+ | :::*Webbrowser - Malicious Payloads | ||
+ | :::*IP Spoofing (Man in the Middle) / Password | ||
+ | ::*Server-side Attacks | ||
+ | :::*Out-dated Software Patches | ||
+ | :::*Database Injection | ||
+ | :::*Password Cracking | ||
− | |||
− | |||
− | |||
Line 220: | Line 232: | ||
+ | :'''Slides (Concepts):''' | ||
+ | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.ppt ppt] ] Types of Attacks | ||
− | + | :'''YouTube Videos:''' | |
+ | ::*[http://www.youtube.com/watch?v=ZUygX8TBBw0 Phishing] | ||
+ | ::*[http://www.youtube.com/watch?v=PqfZM3Lxrmg Malicious Payload] | ||
+ | ::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing] | ||
+ | ::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection] | ||
+ | ::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking] | ||
+ | :'''Reading References:''' | ||
+ | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6) | ||
− | :''' | + | :'''Resources:''' |
− | |||
− | |||
+ | ::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System) | ||
+ | ::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)] | ||
+ | ::*[https://github.com/WebGoat/WebGoat/wiki Webgoat] | ||
− | |||
− | |||
− | |||
− | |||
| | | | ||
− | |||
− | |||
+ | :'''Lab 4:''' | ||
+ | :Attack Categories: | ||
+ | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Types of Attacks] | ||
− | |||
+ | <div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;"> | ||
+ | <div style="float: left; margin-left: -40px;"></div> | ||
+ | <div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.<br /><br /></ol></div> | ||
+ | </div> | ||
+ | |- valign="top" | ||
| | | | ||
+ | :'''Week 6''' | ||
+ | More on mysql injection and Webgoat | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| | | | ||
− | :''' | + | ::* [[https://www.youtube.com/watch?v=Rqt_BgG5YyI Blind MySQL injection video]] |
− | + | '''Moved until after the break''' | |
− | + | :'''Hardening Windows 7/8/10''' | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | :'''Hardening Windows | ||
::*Installing and Configuring Security Configuration Wizard | ::*Installing and Configuring Security Configuration Wizard | ||
::*Using New Technology File System (NTSF) | ::*Using New Technology File System (NTSF) | ||
::*Configuring Automatic Updates | ::*Configuring Automatic Updates | ||
+ | |||
+ | :'''Test #1: Details, March 6th''' | ||
+ | ::# Quiz 2 (February 22) | ||
+ | |||
| | | | ||
Line 278: | Line 294: | ||
:'''Slides (Concepts):''' | :'''Slides (Concepts):''' | ||
− | |||
− | + | ::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Hardening - Basic Concepts | |
− | ::*[http:// | + | ::* [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pptx pptx] ] Hardening Windows |
− | : | ||
− | ::*[http:// | ||
− | : | ||
:'''Reading References:''' | :'''Reading References:''' | ||
− | ::*[http://lcweb.senecac.on.ca: | + | ::*[https://www.sans.org/media/score/checklists/ID-Windows.pdf Intrusion Discovery - Windows] |
− | ::*[http:// | + | ::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: ) |
+ | ::* [http://old.honeynet.org/papers/enemy/ "Know Your Enemy: The Script Kiddie"] | ||
+ | |||
+ | :'''YouTube Videos:''' | ||
+ | ::*[] | ||
:'''Resources:''' | :'''Resources:''' | ||
− | ::* | + | ::* |
− | ::* | + | |
− | :: | + | |
+ | | | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | :'''Assignment #1:''' | ||
+ | ::* Assignment Instructions (N/A) | ||
+ | ::Continue working on '''Lab 4''' and install Webgoat | ||
+ | |||
+ | |||
+ | |- valign="top" | ||
+ | | | ||
+ | |||
+ | :'''Week 7''' | ||
+ | | | ||
− | |||
− | |||
− | :''' | + | :'''Midterm (Test #1 March 6th):''' |
− | ::* | + | ::*(Check course announcements for test details) |
− | |||
− | |||
− | |||
− | |||
| | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | | | ||
+ | |||
+ | |||
+ | :'''Additional Tasks:''' | ||
+ | :'''Lab 5:''' | ||
+ | ::*'''Hardening Windows 7/8/10''' | ||
+ | ::Work on '''Assignment #1''' | ||
− | + | |- valign="center" | |
+ | !colspan="4"|<br />'''Study Week''' | ||
Line 326: | Line 355: | ||
| | | | ||
− | + | ||
− | :'''Week | + | :'''Week 8''' |
+ | |||
+ | |||
| | | | ||
− | :'''Types of | + | :'''Types of Penetration Testing''' |
− | ::* | + | ::*Network |
− | + | ::*Access Control | |
− | + | ::*Infrastructure / Patching | |
− | + | ::*Physical/Building Security | |
− | + | ::*Social Engineering | |
− | + | ||
− | + | | | |
− | |||
+ | :'''Slides (Concepts): See Blackboard''' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Line 355: | Line 380: | ||
− | :''' | + | :'''Lab 6:''' |
− | :: | + | ::Work on vulnerable Windows 7 VM CTF |
+ | |||
+ | |||
+ | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | :''' | + | :'''Assignment #1 Due''' |
− | |||
− | |||
− | + | |- valign="top" | |
− | + | | | |
+ | |||
+ | :'''Week 9''' | ||
+ | | | ||
− | :''' | + | :'''Passwords, Pwn'ing, & Pillaging''' |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| | | | ||
− | :''' | + | :'''Slides (Concepts): See Blackboard''' |
− | + | ||
− | + | ||
− | |||
− | |||
− | |||
− | |||
+ | | | ||
− | :'''Lab | + | :'''Lab 7:''' |
− | :: | + | ::Continue to work on vulnerable Windows 7 VM CTF |
− | |||
− | |||
|- valign="top" | |- valign="top" | ||
Line 417: | Line 427: | ||
− | :''' | + | :'''Metasploit and Metasploitable 2''' |
− | + | ||
− | + | ||
− | + | ||
− | |||
| | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ||
− | |||
| | | | ||
+ | |||
+ | :'''Labs:''' | ||
Line 444: | Line 448: | ||
| | | | ||
:'''Week 11''' | :'''Week 11''' | ||
− | |||
| | | | ||
− | |||
− | |||
− | |||
Line 459: | Line 459: | ||
− | |||
| | | | ||
+ | |||
+ | |||
+ | |||
+ | :'''Lab 8:''' | ||
Line 471: | Line 474: | ||
− | :'''Assignment #2 | + | :'''Work on Assignment #2''' |
− | ::* | + | ::*Complete Report |
− | + | ||
| | | | ||
Latest revision as of 14:57, 21 July 2023
SEC520 Weekly Schedule
Winter 2018
- Instructor:
Austin (SAA)
Craig Barretto (craig.barretto@senecacollege.ca)
- Instructor:
1 credit
- Quiz and Labs ( 4 Quiz, 7 Labs (15%))
- Logbooks due April 10th, 2018
- Assignments (2) 20%
- Assignment 1 - Due Date March 9'
- Assignment 2 - Due Date TBA'
- Tests (2) 30%
- Written Test - March 8'
- Lab Test - March 15
- Final Test 35%
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
More on mysql injection and Webgoat |
Moved until after the break
|
|
|
|
|
|
|
Study Week
| |||
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
Exam Week - TBA |