:'''System Hardening in Linux:Types of Penetration Testing'''::*Purpose::*Rule of Preventative Action::*Rule of Separation::*Rule of Least PrivilegeNetwork:::*AAA Protocol (Authentication):Access Control::::*PKIInfrastructure / Patching::::*PAMPhysical/Building Security::::*KerebosSocial Engineering
|
:'''Slides (Concepts):See Blackboard'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.pptx pptx] ] Linux Hardening - Part 1
::*[[https://www.digitalocean.com/community/tutorials/how-to-use-pam-to-configure-authentication-on-an-ubuntu-12-04-vps PAM Configuration HOWTO]]
::*[[http://hexten.net/assets/pam_abl_doc/index.html PAM Auto Blacklist Module HOWTO]]
:'''Reading References:'''
::*[https://www.sans.org/media/score/checklists/ID-Linux.pdf Intrusion Discovery - Linux]
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
:'''YouTube Videos:'''
::*Linux Hardening
:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
:'''Resources:'''
::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
:'''Lab 6:'''
::System Hardening::*[https://scs.senecac.Work on.ca/~fac/sec520/labs/SEC520_Lab_6.html Linux System Hardening (part 1)]vulnerable Windows 7 VM CTF
:'''System Hardening in Linux / Continued:Passwords, Pwn'ing, & Pillaging'''::*AAA Protocol (Authorization)::::*ACLs:::*SELinux:::*Sudo:::*Cron Jobs:::*Turning Off Xwindows
:'''Slides (Concepts):See Blackboard'''::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.ppt ppt] ] Linux Hardening - Part 2
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=6piQXXHTmqk ACLs]
::*[http://www.youtube.com/watch?v=fpXuWhshKVA SELinux]
::*[http://www.youtube.com/watch?v=imnEUvvDxc4 Sudo]
::*[http://www.youtube.com/watch?v=4Icg3MYZZqI Cron Jobs]
:'''Reading References:'''
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )
::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )
:'''Resources:'''
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
::* SELinux
::* [http://www.sudo.ws/sudo/intro.html Sudo In a Nutshell]
:'''Lab 7:'''
::System Hardening::*[https://scs.senecac.Continue to work on.ca/~fac/sec520/labs/SEC520_Lab_7.html Linux System Hardening (part 2)] :'''Assignment #2:'''::*Assignment Instructions (N/A)vulnerable Windows 7 VM CTF
:'''System Hardening in Linux / Continued:Application Security'''::*Complete Labs 6 and 7
:'''Labs:'''
::*Complete Labs 6 and 7
|
:'''Intrusion Detection:'''
::*Purpose
::*Logs
::*Monitoring
::*Iptables
::*Using Tripwire
:'''Additional Considerations:'''
::*Decoys: Honey-Pots
::*DMZs
::*Disaster Recovery
::*The BIGGER Picture
|
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.ppt ppt] ] Intrusion Detection / Using Tripwire
:'''Reading References:'''
::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=kUdCsZpt2ew Iptables]
:'''Additional Resources:'''
::*
:'''Lab 8:'''
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_8.html Intrusion Detection]
|- valign="top"