- Week
|
- Objectives and Tasks
|
- Course Notes / Assigned Reading
|
- Labs
|
- Week 1
|
- Course Introduction:
- SEC701 WIKI
- Course Outline
- Course Policies
- Required Materials
- Topics:
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 1:
- x
- Lab 2:
- x
|
- Week 2
|
- Foot-Printing, Verification, Scanning & Enumeration:
- Lab 2 (Reconnaissance) Debriefing
- Penetration Testing (Part 2):
- Foot-printing
- Verification
- Scanning
- Enumeration
- Exploiting Vulnerabilities
- System Vulnerabilities & Attacks
- Techniques Used to Exploit Vulnerable Systems
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 3a:
- Penetration Testing / Continued:
- Lab 3b:
- Penetration Testing / Continued:
- Assignment #1 Posted:
|
- Week 3
|
- System Hardening in Linux:
- Purpose of System Hardening
- Authentication,Authorization,Accounting
(AAA Protocol)
- Pluggable Authentication Module (PAM)
- Access Control Lists (ACLs)
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 4:
- Linux System Hardening (Part 1)
- Lab 5:
- Linux System Hardening (Part 2)
|
- Week 4
|
- System Hardening in Linux / Continued:
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 6:
- Linux System Hardening (Part 3)
- Lab 7:
- Linux System Hardening (Part 4)
|
- Week 5
|
- Test #1:
|
|
- Assignment #1 Due:
- Assignment Submission Instructions
|
- Week 6
|
- System Hardening in Windows:
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 8:
- Assignment #2 Posted:
|
- Week 7
|
- Intrusion Discovery:
- Linux
- Windows
- Using Tripwire Open-Source Utility
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 9:
|
|
Study Week
|
- Week 8
|
- Disaster Recovery:
- Linux System Backup & Recovery
- Windows System Backup & Recovery
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Lab 10:
- Assignment #2 Due:
- Assignment Submission Instructions
|
- Week 9
|
- Securing the Perimeter: Additional Techniques
- Honeypots
- Using Tripwire Open-Source Utility
|
- Slides (Concepts):
- Reading References:
- Resources:
|
- Assignment #3 Posted:
|
- Week 10
|
- Securing the Perimeter: Additional Techniques
- Consequences of Abuse or Incompetence
- Password Cracking
- Sniffing
- "Man in the Middle" Attacks
|
- Slides (Concepts):
- Reading References:
- Resources:
|
|
- Week 11
|
- Test #2:
|
|
|
- Week 12
|
- Course Completion:
- Complete Labs
- Complete Assignment #3
- Course Review
|
|
- Assignment #3 Due:
- Assignment Submission Instructions
|
- Week 13
|
|
|
|
Exam Week - TBA
|