Difference between revisions of "SEC520 Weekly Schedule"
Line 103: | Line 103: | ||
:'''Slides (Concepts):''' | :'''Slides (Concepts):''' | ||
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration | ||
− | + | ||
− | |||
:'''Reading References:''' | :'''Reading References:''' | ||
Line 112: | Line 111: | ||
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2] | ||
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration] | ::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration] | ||
− | + | ||
− | |||
− | |||
:'''Resources:''' | :'''Resources:''' | ||
::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports) | ::*[http://nmap.org/book/man.html Nmap Reference Guide]<br />(How to use '''nmap''' utility to scan ports) | ||
− | + | ||
| | | | ||
Line 142: | Line 139: | ||
| | | | ||
+ | :'''Scanning, Enumeration, & Vulnerability Testing:''' | ||
+ | ::*Vulnerability Testing | ||
+ | |||
+ | |||
+ | | | ||
+ | :'''Slides (Concepts):''' | ||
+ | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing | ||
+ | ::* [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.odp odp] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.pdf pdf] ] [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.ppt ppt] ] Interpreting and Respecting the Rules for the Tank Server | ||
+ | :'''Reading References:''' | ||
+ | ::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3) | ||
− | + | :'''YouTube Videos:''' | |
+ | ::*[https://www.youtube.com/watch?v=FMgAIfcPsyw Vulnerability Testing - Overview] | ||
+ | ::*[https://www.youtube.com/watch?v=lNjxwvQT-os Nessus] | ||
+ | ::*[https://www.youtube.com/watch?v=hRxOW37MRwc Accessing System Via Metasploit (web-browser)] | ||
+ | :'''Resources:''' | ||
+ | ::*[http://www.commonexploits.com/?p=243 Using Armitage] (Metasploit Framework) | ||
| | | | ||
+ | :'''Lab 3:''' | ||
+ | ::Continue Working on '''Lab 3''' | ||
Revision as of 13:14, 22 October 2012
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Study Week | |||
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
Exam Week - TBA |