Open main menu

CDOT Wiki β

SEC52O Weekly Schedule

Revision as of 19:28, 11 June 2012 by Msaul (talk | contribs)
Important.png
This WIKI is a Draft
This is NOT a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the Fall 2012 sesemster.
Week
Objectives and Tasks
Course Notes / Assigned Reading
Labs
Week 1


Course Introduction:
  • SEC520 WIKI
  • Course Outline
  • Course Policies
  • Required Materials
  • Lab Setup


Developing a "Security Mind":
  • 4 Virtues of Internet Security
  • 8 Rules of Internet Security
  • Penetration Testing:
  • Reconnaissance:
  • Information Gathering
  • Foot-printing
  • User Information
  • Verification


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
  • [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
Reading References:
YouTube Videos:
Resources:


Lab 1:
Set-Up for Labs:
Lab 2:
Pentration Testing:
Week 2


Scanning, Enumeration, & Vulnerability Testing:
  • Penetration Testing (Continued):
  • Scanning
  • Enumeration
  • Vulnerability Testing



Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
  • [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
Reading References:
YouTube Videos:
Resources:



Lab 3:
Penetration Testing / Continued:
WARNING!
Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.



Assignment #1 Posted:
  • Details: N/A


Week 3


System Hardening in Linux:
  • Purpose
  • Rule of Preventative Action
  • Rule of Separation
  • Rule of Least Privilege
  • AAA Protocol (Authentication):
  • PKI
  • PAM
  • Kerebos


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 1)
Reading References:
YouTube Videos:
  • Linux Hardening
Part1 | Part 2 | Part 3
Resources:


Lab 4:
System Hardening


Week 4



System Hardening in Linux / Continued:
  • AAA Protocol (Authorization):
  • ACLs
  • SELinux
  • Sudo
  • Cron Jobs
  • Turning Off Xwindows


Slides (Concepts):
  • [ odp ] [ pdf ] [ ppt ] Linux Hardening (part 2)
YouTube Videos:
Reading References:
Resources:


Lab 5:
System Hardening
Week 5



Midterm (Test #1) Review:
  • Complete Labs 1 - 5
  • Submit Assignment #1
  • Review for Midterm




Assignment #1 Due:
  • Assignment Submission Instructions
Week 6



Midterm (Test #1):
  • Test Details




Week 7



Types of Attacks:
  • Client-side Attacks
  • Phishing
  • Webbrowser - Malicious Payloads
  • IP Spoofing (Man in the Middle)
  • Server-side Attacks
  • Out-dated Software Patches
  • Database Injection
  • Password



Slides (Concepts):
YouTube Videos:
Reading References:


Lab 6:



Study Week


Week 8


Hardening Windows:
  • Hardening Windows Systems


Slides (Concepts):
  • [odp] [pdf] [ppt] Hardening Windows


Reading References:
YouTube Videos:
Resources:


Lab 7:



Week 9


Intrusion Detection:
  • Purpose
  • Logs
  • Monitoring, Iptables
  • Using Tripwire



Slides (Concepts):
  • [odp] [pdf] [ppt] Intrusion Detection / Using Tripwire


Reading References:
YouTube Videos:
Resources:


Lab 8:
Assignment #2 Posted:
  • Details - N/A
Week 10


Additional Considerations:
  • Decoys: Honey-Pots
  • Malware (Trojan Horses, Denial of Service - DoS)


Slides:

  • [odp] [pdf] [ppt] Securing the Perimeter
Reading References:
YouTube Videos:
Resources:



Week 11



Test #2:
  • Test Details





Week 12



Assignment #2 Evaluation:
  • Presentations
  • Evaluate Secured System
Assignment #2 Due:
  • Assignment Submission Instructions


Week 13



Final Exam Review
  • Details



Exam Week - TBA