SEC52O Weekly Schedule

From CDOT Wiki
Revision as of 09:00, 9 June 2012 by Msaul (talk | contribs)
Jump to: navigation, search
Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing
  • Client-side Attacks:
  • Human-side Errors
  • Operating System / Applications (Metasploit)
  • Phishing
  • Social Networking


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:
  • Details: N/A


Week 3


System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authentication):
  • PKI
  • PAM
  • Kerebos


Slides (Concepts):
  • [odp] [pdf] [ppt] Linux Hardening (part 1)


Reading References:
YouTube Videos:
Resources:


Lab 4:
System Hardening


Week 4



System Hardening in Linux / Continued:
  • AAA Protocol (Authorization):
  • ACLs
  • SELinux
  • Sudo
  • Cron Jobs
  • Iptables


Slides (Concepts):
  • [odp] [pdf] [ppt] Linux Hardening (part 2)
YouTube Videos:
Reading References:
Resources:


Lab 5:
System Hardening
Week 5



Midterm (Test #1 )Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Network-Side Attacks:
  • Database Services
  • TCP Stacks
  • Web Server / Web Applications


Slides (Concepts):
  • [odp] [pdf] [ppt] Network-Side Attacks
Reading References:
  • x
YouTube Videos:
Resources:


Lab 6:



Study Week


Week 8


Hardening Windows:
  • Hardening Windows Systems


Slides (Concepts):
  • [odp] [pdf] [ppt] Hardening Windows


Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring
  • Using Tripwire



Slides (Concepts):
  • [odp] [pdf] [ppt] Intrusion Detection / Using Tripwire


Reading References:
YouTube Videos:
Resources:


Lab 8:
Assignment #2 Posted:
  • Details - N/A
Week 10


Additional Considerations:
  • Decoys: Honeypots
  • Packet Sniffers
  • Malware
  • Trojan Horses


Slides:

  • [odp] [pdf] [ppt] Securing the Perimeter
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13


Final Exam Review

  • Details



Exam Week - TBA