Open main menu

CDOT Wiki β

Changes

SEC701 Weekly Schedule

903 bytes removed, 10:50, 26 May 2012
no edit summary
:'''Foot-Printing, Verification, Scanning & EnumerationTopics:'''::*Lab 2 (Reconnaissance) Debriefing::*Penetration Testing (Part 2)::::*Foot-printing:::*Verification:::*Scanning:::*Enumeration  :'''Exploiting Vulnerabilities'''::*System Vulnerabilities & Attacks::*Techniques Used to Exploit Vulnerable Systemsx
|
:'''System Hardening in LinuxTopics:'''::*Purpose of System Hardening::*Authentication,Authorization,Accounting<br /> (AAA Protocol):::*Pluggable Authentication Module (PAM):::*Access Control Lists (ACLs)x
|
:'''System Hardening in Linux / ContinuedTopics:'''::* SELinux::* Sudox
|
:'''System Hardening in WindowsTopics:'''::*x
|
 :'''Intrusion DiscoveryTopics:'''::*Linux::*Windows::*Using Tripwire Open-Source Utilityx
|
:'''Disaster RecoveryTopics:'''::*Linux System Backup & Recovery::*Windows System Backup & Recoveryx
|
|
 :'''Securing the PerimeterTopics: Additional Techniques'''::*Honeypots::*Using Tripwire Open-Source Utilityx
|
:'''Securing the PerimeterTopics: Additional Techniques'''::*Consequences of Abuse or Incompetence::*Password Cracking::*Sniffing::*"Man in the Middle" Attacksx
|
13,420
edits