SEC52O Weekly Schedule

From CDOT Wiki
Revision as of 15:08, 7 June 2012 by Msaul (talk | contribs) (Created page with '{{Admon/important|This WIKI is a Draft|This is '''NOT''' a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the '''Fall 2012''' sesemster.}} […')
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing
  • Client-side Attacks:
  • Software Patches (Metasploit)
  • Phishing
  • Social Networking


Slides (Concepts):
Penetration Testing (continued):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:
  • Details: N/A


Week 3


System Hardening in Linux:
  • Purpose of System Hardening
  • Elements of System Hardening:
  • Human-Based Hardening
  • Network Design
  • Authentication,Authorization,Accounting
    (AAA Protocol)



Slides (Concepts):
  • [odp] [pdf] [ppt] System Hardening
  • [odp] [pdf] [ppt] Authentication, Authorization, Accounting (AAA Protocol)
Reading References:
YouTube Videos:
Resources:


Lab 4:
Linux System Hardening (Part 1)


Week 4



System Hardening in Linux / Continued:
  • Iptables
  • SSH
  • SELinux
  • Sudo


Slides (Concepts):
  • [odp] [pdf] [ppt] Iptables & SSH
  • [odp] [pdf] [ppt] SELinux & Sudo
YouTube Videos:
Reading References:
Resources:


Lab 5:
Linux System Hardening (Part 2)
Week 5



Midterm (Test #1 )Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Network-Side Attacks:
  • Database Services
  • Web Server / Web Applications


Slides (Concepts):
  • [odp] [pdf] [ppt] Network-Side Attacks
Reading References:
YouTube Videos:
Resources:


Lab 6:



Study Week


Week 8


Hardening Windows:
  • Hardening Windows Systems


Slides (Concepts):
  • [odp] [pdf] [ppt] Hardening Windows


Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection (Linux / Windows):
  • Purpose
  • Logs
  • Monitoring
  • Using Tripwire



Slides (Concepts):
  • [odp] [pdf] [ppt] Intrusion Discovery - Using Tripwire


Reading References:
YouTube Videos:
Resources:


Lab 8:
Assignment #2 Posted:
  • Details - N/A
Week 10


Additional Considerations:
  • Decoys: Honeypots
  • Malware
  • Trojan Horses


Slides:

  • [odp] [pdf] [ppt] Securing the Perimeter
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13


Final Exam Review

  • Details



Exam Week - TBA