Changes

Jump to: navigation, search

SEC520 Weekly Schedule

3,346 bytes removed, 15:57, 21 July 2023
m
Protected "SEC520 Weekly Schedule": OER transfer ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))
=SEC520 Weekly Schedule=
== Summer 2015Winter 2018==::Instructor:<br />Murray Saul Austin (ASAA)<br />Craig Barretto (craig.barretto@senecacollege.ca)1 credit::*Quiz and Labs ( 4 Quiz, 7 Labs (15%))::::'''Logbooks due April 10th, 2018'''::*Assignments (2) 20%::::'''Assignment 1 - Due Date March 9''''''::::'''Assignment 2 - Due Date TBA''''''::*Tests (2) 30%::::'''Written Test - March 8''''''::::'''Lab Test - March 15'''''::*Final Test 35%
{|width="100%" border="1" cellspacing="2"
| style="width: 10%;" |
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520 SEC520 WIKI]
::* [https://scs.senecac.on.ca/course/sec520 Course Outline]
::* [https://cs.senecac.on.ca/~scs/DonMillsPolicies/policy.html Course Policies]::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520#Supplies_Checklist_ Required Materials are listed in your Supplies Checklist.28Required_for_Second_ClassOther materials and references are noted week by week.29 Required Materials]
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration]
::*[https://pentest-tools.com/network-vulnerability-scanning/tcp-port-scanner-online-nmap Online Pen-Test Scanner]::*[https://www.youtube.com/watch?v=dR7NTYfmNcA Prep for Metasploit]
:'''Resources:'''
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
<div style="float: left; margin-left: -40px;"></div>
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
</div>
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing
::* [ [http://matrix.senecac.on.ca/~murray.saul/tank-rules.pdf pdf] ] Interpreting and Respecting the Rules for the Tank Server
:'''Reading References:'''
:'''Resources:'''
::*[https://www.youtube.com/watch?v=r4Qq2eVjiP0 Setting up the Metasploit database]::*[https://www.youtube.com/watch?v=x01ZErjNlX0 First Metasploit Payload]::*[http://www.commonexploitsyoutube.com/watch?pv=243 jJd5qg3fkyw Using Armitage] (Metasploit Framework)]
::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System)
::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)]
::*[https://github.com/WebGoat/WebGoat/wiki Webgoat]
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
<div style="float: left; margin-left: -40px;"></div>
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank any server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
</div>
:'''Week 6'''
More on mysql injection and Webgoat
|
::* [[https://www.youtube.com/watch?v=Rqt_BgG5YyI Blind MySQL injection video]]'''Moved until after the break''':'''Hardening Windows 2003 Server:7/8/10'''
::*Installing and Configuring Security Configuration Wizard
::*Using New Technology File System (NTSF)
::*Configuring Automatic Updates
:'''Test #21:Details, March 6th'''::*Test Details# Quiz 2 (February 22)
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003]
:'''Resources:'''
:'''Lab 5:'''::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_5.html Hardening Windows 2003 Server]
:'''Assignment #1:'''
::* Assignment Instructions (N/A)
::Continue working on '''Lab 4''' and install Webgoat
:'''Midterm (Test #1March 6th):'''
::*(Check course announcements for test details)
:'''Additional Tasks:'''
::Continue working on '''Lab 5:'''::*'''Hardening Windows 7/8/10'''
::Work on '''Assignment #1'''
:'''System Hardening in Linux:Types of Penetration Testing'''::*Purpose::*Rule of Preventative Action::*Rule of Separation::*Rule of Least PrivilegeNetwork:::*AAA Protocol (Authentication):Access Control::::*PKIInfrastructure / Patching::::*PAMPhysical/Building Security::::*KerebosSocial Engineering
|
:'''Slides (Concepts):See Blackboard'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.ppt ppt] ] Linux Hardening
:'''Reading References:'''
::*[https://www.sans.org/media/score/checklists/ID-Linux.pdf Intrusion Discovery - Linux]
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
 
:'''YouTube Videos:'''
::*Linux Hardening
:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
 
:'''Resources:'''
::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
:'''Lab 6:'''
::System Hardening::*[https://scs.senecac.Work on.ca/~fac/sec520/labs/SEC520_Lab_6.html Linux System Hardening (part 1)]vulnerable Windows 7 VM CTF
:'''System Hardening in Linux / Continued:Passwords, Pwn'ing, & Pillaging'''::*AAA Protocol (Authorization)::::*ACLs:::*SELinux:::*Sudo:::*Cron Jobs:::*Turning Off Xwindows
:'''Slides (Concepts):See Blackboard''' :'''YouTube Videos:'''::*[http://www.youtube.com/watch?v=6piQXXHTmqk ACLs]::*[http://www.youtube.com/watch?v=fpXuWhshKVA SELinux]::*[http://www.youtube.com/watch?v=imnEUvvDxc4 Sudo]::*[http://www.youtube.com/watch?v=4Icg3MYZZqI Cron Jobs] :'''Reading References:'''::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )
:'''Resources:'''
::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
::* SELinux
::* [http://www.sudo.ws/sudo/intro.html Sudo In a Nutshell]
:'''Lab 7:'''
::System Hardening::*[https://scs.senecac.Continue to work on.ca/~fac/sec520/labs/SEC520_Lab_7.html Linux System Hardening (part 2)]   :'''Assignment #2:'''::*Assignment Instructions (N/A)vulnerable Windows 7 VM CTF
:'''System Hardening in Linux / Continued:Metasploit and Metasploitable 2'''::*Complete Labs 6 and 7
:'''Labs:'''
::*Complete Labs 6 and 7
:'''Intrusion Detection:'''
::*Purpose
::*Logs
::*Monitoring
::*Iptables
::*Using Tripwire
 
 
:'''Additional Considerations:'''
::*Decoys: Honey-Pots
::*DMZs
::*Disaster Recovery
::*The BIGGER Picture
|
 
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.ppt ppt] ] Intrusion Detection / Using Tripwire
 
:'''Reading References:'''
::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
 
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=kUdCsZpt2ew Iptables]
 
:'''Additional Resources:'''
::*
:'''Lab 8:'''
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_8.html Intrusion Detection]
|- valign="top"

Navigation menu