- Week
|
- Objectives and Tasks
|
- Course Notes / Assigned Reading
|
- Labs
|
- Week 1
|
- Course Introduction:
- SEC520 WIKI
- Course Outline
- Course Policies
- Required Materials
- Lab Setup
- Developing a "Security Mind":
- 4 Virtues of Internet Security
- 8 Rules of Internet Security
- Penetration Testing:
-
- Information Gathering
- Foot-printing
- User Information
- Verification
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
- [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 1:
- Set-Up for Labs:
- Lab 2:
- Pentration Testing:
|
- Week 2
|
- Scanning, Enumeration, & Vulnerability Testing:
- Penetration Testing (Continued):
-
- Human-side Errors
- Operating System / Applications (Metasploit)
- Phishing
- Social Networking
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
- [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 3:
- Penetration Testing / Continued:
WARNING! Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.
- Assignment #1 Posted:
|
- Week 3
|
- System Hardening in Linux:
- Purpose of System Hardening
- Internet Security Rules:
-
- Separate Servers, turn-off open ports, AAA Protocol (Authorization, Authentication, Accounting)
- Rule of Preventative Action
- Rule of Least Priviledge / Rule of Trust
- Password Policies
- Cron Jobs
- SELinux
- Sudo
- Iptables
|
- Slides (Concepts):
- [odp] [pdf] [ppt] System Hardening
- [odp] [pdf] [ppt] Authentication, Authorization, Accounting (AAA Protocol)
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 4:
- Linux System Hardening (Part 1)
|
- Week 4
|
- System Hardening in Linux / Continued:
|
- Slides (Concepts):
- [odp] [pdf] [ppt] Iptables & SSH
- [odp] [pdf] [ppt] SELinux & Sudo
- YouTube Videos:
- Reading References:
- Resources:
|
- Lab 5:
- Linux System Hardening (Part 2)
|
- Week 5
|
- Midterm (Test #1 )Review:
- Complete Labs 1 - 5
- Submit Assignment #1
- Review for Midterm
|
|
- Assignment #1 Due:
- Assignment Submission Instructions
|
- Week 6
|
- Midterm (Test #1):
|
|
|
- Week 7
|
- Network-Side Attacks:
- Database Services
- TCP Stacks
- Web Server / Web Applications
|
- Slides (Concepts):
- [odp] [pdf] [ppt] Network-Side Attacks
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 6:
|
Study Week
|
- Week 8
|
- Hardening Windows:
- Hardening Windows Systems
|
- Slides (Concepts):
- [odp] [pdf] [ppt] Hardening Windows
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 7:
|
- Week 9
|
- Intrusion Detection (Linux / Windows):
- Purpose
- Logs
- Monitoring
- Using Tripwire
|
- Slides (Concepts):
- [odp] [pdf] [ppt] Intrusion Detection / Using Tripwire
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 8:
- Assignment #2 Posted:
|
- Week 10
|
- Additional Considerations:
- Decoys: Honeypots
- Packet Sniffers
- Malware
- Trojan Horses
|
Slides:
- [odp] [pdf] [ppt] Securing the Perimeter
- Reading References:
- YouTube Videos:
- Resources:
|
|
- Week 11
|
- Test #2:
|
|
|
- Week 12
|
- Assignment #2 Evaluation:
- Presentations
- Evaluate Secured System
|
|
- Assignment #2 Due:
- Assignment Submission Instructions
|
- Week 13
|
Final Exam Review
|
|
|
Exam Week - TBA
|