- Week
|
- Objectives and Tasks
|
- Course Notes / Assigned Reading
|
- Labs
|
- Week 1
|
- Course Introduction:
- SEC520 WIKI
- Course Outline
- Course Policies
- Required Materials
- Lab Setup
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Course Intro / The "Security Mind"
- Reading References:
- Resources:
- Required Materials are listed in your Supplies Checklist. Other materials and references are noted week by week.
|
- Lab 1:
- Set-Up for Labs:
|
- Week 2
|
- Developing a "Security Mind":
- 4 Virtues of Internet Security
- 8 Rules of Internet Security
- Penetration Testing:
-
- Information Gathering
- Foot-printing
- User Information
- Verification
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Penetration Testing: Reconnaissance
- Reading References:
- YouTube Videos:
|
- Lab 2:
- Pentration Testing:
|
- Week 3
|
- Scanning, Enumeration, & Vulnerability Testing:
- Penetration Testing (Continued):
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Scanning & Enumeration
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 3:
- Penetration Testing / Continued:
|
- Week 4
|
- Scanning, Enumeration, & Vulnerability Testing:
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Vulnerability Testing
- Reading References:
- YouTube Videos:
- Resources:
|
- Lab 3:
- Continue Working on Lab 3
|
- Week 5
|
- Types of Attacks:
-
- Phishing
- Webbrowser - Malicious Payloads
- IP Spoofing (Man in the Middle) / Password
- Out-dated Software Patches
- Database Injection
- Password Cracking
|
- Slides (Concepts):
- YouTube Videos:
- Reading References:
- Resources:
|
- Lab 4:
- Attack Categories:
WARNINGS!- Scanning ports must require the permission of Server Owner (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.
|
- Week 6
More on mysql injection and Webgoat
|
Moved until after the break
- Hardening Windows 7/8/10
- Installing and Configuring Security Configuration Wizard
- Using New Technology File System (NTSF)
- Configuring Automatic Updates
- Test #1: Details, March 6th
- Quiz 2 (February 22)
|
- Slides (Concepts):
- Reading References:
- YouTube Videos:
- Resources:
|
- Assignment #1:
- Assignment Instructions (N/A)
- Continue working on Lab 4 and install Webgoat
|
- Week 7
|
- Midterm (Test #1 March 6th):
- (Check course announcements for test details)
|
|
- Additional Tasks:
- Lab 5:
- Work on Assignment #1
|
Study Week
|
- Week 8
|
- System Hardening in Linux:
- Purpose
- Rule of Preventative Action
- Rule of Separation
- Rule of Least Privilege
- AAA Protocol (Authentication):
|
- Slides (Concepts):
- Reading References:
- YouTube Videos:
-
- Part1 | Part 2 | Part 3
- Resources:
|
- Lab 6:
- System Hardening
- Assignment #1 Due
|
- Week 9
|
- System Hardening in Linux / Continued:
- AAA Protocol (Authorization):
- ACLs
- SELinux
- Sudo
- Cron Jobs
- Turning Off Xwindows
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Linux Hardening - Part 2
- YouTube Videos:
- Reading References:
- Resources:
|
- Lab 7:
- System Hardening
- Assignment #2:
- Assignment Instructions (N/A)
|
- Week 10
|
- System Hardening in Linux / Continued:
|
|
- Labs:
|
- Week 11
|
- Intrusion Detection:
- Purpose
- Logs
- Monitoring
- Iptables
- Using Tripwire
- Additional Considerations:
- Decoys: Honey-Pots
- DMZs
- Disaster Recovery
- The BIGGER Picture
|
- Slides (Concepts):
- [ odp ] [ pdf ] [ ppt ] Intrusion Detection / Using Tripwire
- Reading References:
- YouTube Videos:
- Additional Resources:
|
- Lab 8:
|
- Week 12
|
- Work on Assignment #2
|
|
- Assignment #2 Due:
|
- Week 13
|
- Final Exam Review
|
|
|
Exam Week - TBA
|