Difference between revisions of "SEC520 Weekly Schedule"
Line 234: | Line 234: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Line 248: | Line 239: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Line 358: | Line 324: | ||
:'''Week 9''' | :'''Week 9''' | ||
| | | | ||
+ | |||
+ | |||
+ | :'''Types of Attacks:''' | ||
+ | ::*Client-side Attacks | ||
+ | :::*Phishing | ||
+ | :::*Webbrowser - Malicious Payloads | ||
+ | :::*IP Spoofing (Man in the Middle) / Password | ||
+ | ::*Server-side Attacks | ||
+ | :::*Out-dated Software Patches | ||
+ | :::*Database Injection | ||
+ | :::*Password Cracking | ||
+ | |||
Line 370: | Line 348: | ||
| | | | ||
+ | |||
+ | |||
+ | :'''Slides (Concepts):''' | ||
+ | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.ppt ppt] ] Types of Attacks | ||
+ | |||
+ | :'''YouTube Videos:''' | ||
+ | ::*[http://www.youtube.com/watch?v=ZUygX8TBBw0 Phishing] | ||
+ | ::*[http://www.youtube.com/watch?v=PqfZM3Lxrmg Malicious Payload] | ||
+ | ::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing] | ||
+ | ::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection] | ||
+ | ::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking] | ||
+ | |||
+ | :'''Reading References:''' | ||
+ | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6) | ||
+ | |||
+ | :'''Resources:''' | ||
+ | |||
+ | ::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System) | ||
+ | ::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)] | ||
+ | |||
Line 386: | Line 384: | ||
::*[http://www.sans.org/score/checklists/ID_Windows.pdf Intrusion Discovery - Windows] | ::*[http://www.sans.org/score/checklists/ID_Windows.pdf Intrusion Discovery - Windows] | ||
| | | | ||
+ | |||
+ | |||
+ | :'''Lab 6:''' | ||
+ | :Attack Categories: | ||
+ | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_6.html Types of Attacks] | ||
+ | |||
+ | |||
+ | <div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;"> | ||
+ | <div style="float: left; margin-left: -40px;"></div> | ||
+ | <div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div> | ||
+ | </div> | ||
+ | |||
Revision as of 13:03, 22 October 2012
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Study Week | |||
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
Exam Week - TBA |