Changes

Jump to: navigation, search

SEC830

428 bytes added, 23:42, 22 January 2009
no edit summary
<span style="background: #ffff00">'''Note!''' This information is under revision.</span>
 
= SEC830 - Security Issues =
SYA810 is taught by [[User:Selmys|John Selmys]] (Winter 2009)
== Weekly Outline External Links == See the [http://cs.senecac.on.ca/~selmys/subjects/sec830-091/sec830-plan-091.html Winter 2009 SEC830 Weekly Schedule] for specific dates and topics. For up to date notes, see [http://cs.senecac.on.ca/~selmys/subjects/sec830-091/index.html John's winter 2009 SEC830 page on CS] This is the [http://cs.senecac.on.ca/~selmys/subjects/sec830-071/index.html old SEC830], from Jan 2007. NOTE: It will be updated this semester.
See the [Here's a good article about [http://csblogs.senecacgurulabs.on.cacom/aaron/~selmys2008/subjects10/sec830shadowed-091/indexpasswords.html Winter 2009 SEC830 Weekly Schedulepasswords and encryption]] for specific dates and topicson Linux.
Nes: This is == Lab Notes == Here's the [[http://csplace to put notes dealing with our labs.senecac.onFor example, problems we ran into and their solutions; things we discovered; weird results, etc.ca/~selmys/subjects/sec830-071/indexetc.html old SEC830]](But please, note that it would be changed during NOT the semester. Just for people wants answers to learn in advancedthe questions before the due dates.) [[ 2009_SEC830_LAB01 | Lab #1 ]] [[ 2009_SEC830_LAB02 | Lab #2 ]] [[ 2009_SEC830_LAB03 | Lab #3 ]] [[ 2009_SEC830_LAB04 | Lab #4 ]] [[ 2009_SEC830_LAB05 | Lab #5 ]]
== Subject Description ==
Upon successful completion of this subject students should be able to:
* install and use encryption software * maintain user accounts and passwords * implement and use public key infrastructures * identify and disable unused system services * audit the security of a Linux system * enable and use wrappers and proxies * maintain file permissions and access control lists * implement and maintain manditory access controls * setup, maintain and monitor system logs * configure a Linux firewall * setup intrusion prevention and detection systems * monitor and restrict logins * install, configure and administrate authentication schemes
=== Topic Outline ===
* System Security - 15%
** backups
** monitoring accounts
** system logs
* Network Security - 20%
** trusted hosts
** TCP wrppers
** securing network services
** firewalls
** network file systems (NFS CIFS)
** wireless security
* The Secure Shell (SSH) - 10%
** Installation installation, configuration and Configurationuse
* Pluggable Authentication Modules (PAM) - 10%
** Installationinstallation, Configurationconfiguration, Administrationadministration
* Security Tools - 15%
** Tripwiretripwire, Crackcrack, Satansatan, Saintsaint** Root kits** Tigertiger, COPS** Sniffers sniffers (tcpdump, sniffit, kismet)** Port port Scanning using nmap
* Intrusion Prevention Mandatory Access Controls - 10%** AppArmor
** SELinux
=== Prescribed Text ===
* Hack NotesNone: Linux and Unix Security Portable Reference by Nitesh Dhanjani; ISBN 0-07-222786-9 published by McGraw-Hill/OsborneWeb links to relevant information will be given during the semester.
=== Reference Material ===
=== Modes of Evaluation ===
 * 02% Quiz #1* 03% Quiz #2* 3010% Assignments/Labs* 4010% Assignment #1* 15% Assignment #2* 30% Final Exam
* 30% Midterm Test
63
edits

Navigation menu