1,576
edits
Changes
m
{{Admon/important|This WIKI is a Draft|This is '''NOT''' a finalized version for SEC520. This SEC520 WIKI resource is scheduled to be used for the '''Fall 2012''' sesemster.}}
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind"
:'''Resources:'''
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520 SEC520 WIKI]
::* [https://scs.senecac.on.ca/course/sec520 Course Outline]
::* [https://cs.senecac.on.ca/~scs/DonMillsPolicies/policy.html Course Policies]
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520#Supplies_Checklist_.28Required_for_Second_Class.29 Required Materials]
:'''Lab 1:'''
::Set-Up for Labs:
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs]
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l2.ppt ppt] ] Vulnerability Testing
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div>
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_3.html Scanning, Enumeration, & Vulnerability Testing]|- valign="top"|
|- valign="top"
:'''Week 3'''
|
:'''System Hardening in Linux:'''
::*Purpose
::*Rule of Preventative Action
::*Rule of Separation
::*Rule of Least Privilege
:::*AAA Protocol (Authentication):
::::*PKI
::::*PAM
::::*Kerebos
|:'''Types of Attacks:'''::*Client-side Attacks:::*Phishing:::*Webbrowser - Malicious Payloads:::*IP Spoofing (Man in the Middle) / Password::*Server-side Attacks:::*Out-dated Software Patches:::*Database Injection:::*Password Cracking
:'''System Hardening in Linux / Continued:'''
::*AAA Protocol (Authorization):
:::*ACLs
:::*SELinux
:::*Sudo
:::*Cron Jobs
:::*Turning Off Xwindows
:'''Lab 5:'''
::System Hardening
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_5.html Linux System Hardening (part 2)]
|- valign="top"
:'''Week 5'''
|:'''Lab 4:''':Attack Categories:::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Types of Attacks]
:'''Midterm (Test #1) Review:'''
::*Complete Labs 1 - 5
::*Submit Assignment #1
::*Review for Midterm
|- valign="top"
:'''Week 6'''
|:'''Slides (Concepts):''' ::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Hardening - Basic Concepts::* [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/labs/sec520_lab5.pptx pptx] ] Hardening Windows :'''Reading References:'''::*[https://www.sans.org/media/score/checklists/ID-Windows.pdf Intrusion Discovery - Windows]::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )::* [http://old.honeynet.org/papers/enemy/ "Know Your Enemy: The Script Kiddie"]
|
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w7_l1.ppt ppt] ] Types of Attacks
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=ZUygX8TBBw0 Phishing]
::*[http://www.youtube.com/watch?v=PqfZM3Lxrmg Malicious Payload]
::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing]
::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection]
::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking]
:|- valign="center"!colspan="4"|<br />'''Resources:Study Week'''
::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System)
::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)]
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_6.html Types of Attacks]|
|- valign="center"!colspan="4"|:'''Study WeekSlides (Concepts): See Blackboard'''|- valign="top"|
:'''Week 8'''
|
:'''Hardening Windows 2003 Server:'''
::*Installing and Configuring Security Configuration Wizard
::*Using New Technology File System (NTSF)
::*Configuring Automatic Updates
:'''Reading References:'''
::* [http://lcweb.senecac.on.ca:2052/toc.aspx?site=RYW9D&bookid=12602 Hardening Windows, 2nd Edition]<br />(Chapter 5 - Pages: )
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=df1_yx2fa8g Security Configuration Wizard 2003]
:'''Resources:'''
::*
|
:'''Reading References:'''
::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=kUdCsZpt2ew Iptables]
:'''Additional Resources (for interest):'''
::*[http://www.sans.org/score/checklists/ID_Windows.pdf Intrusion Discovery - Windows]
:'''Lab 8:'''
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_8.html Intrusion Detection]
:'''Assignment #2 Posted:'''
::*Details - N/A
:'''Slides:'''
::* <div style="background:#ffff00">[odp] [pdf] [ppt] Additional Considerations</div>
:'''Reading References:'''
::*
:'''YouTube Videos:'''
::*
:'''Resources:'''::*
:'''Test #2:'''
::*Test Details
<!-- * SELinux and httpd -->
::* Assignment Submission Instructions
Protected "SEC520 Weekly Schedule": OER transfer ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))
[[Category:SEC520]]
=SEC520 Weekly Schedule=
== Winter 2018==
::Instructor:<br />Austin (SAA)<br />Craig Barretto (craig.barretto@senecacollege.ca)
1 credit
::*Quiz and Labs ( 4 Quiz, 7 Labs (15%))
::::'''Logbooks due April 10th, 2018'''
::*Assignments (2) 20%
::::'''Assignment 1 - Due Date March 9''''''
::::'''Assignment 2 - Due Date TBA''''''
::*Tests (2) 30%
::::'''Written Test - March 8''''''
::::'''Lab Test - March 15'''''
::*Final Test 35%
{|width="100%" border="1" cellspacing="2"
| style="width: 10%;" |
|- valign="top"
|
:'''Week 1'''
::* Required Materials
::* Lab Setup
|
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l1.ppt ppt] ] Course Intro / The "Security Mind"
:'''Reading References:'''
::* [http://lcweb.senecac.on.ca:2053/0596006691 Computer Security Basics (E-book)]<br />(Chapter 1: The New Insecurity)
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3)
::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)
:'''Resources:'''
::* [http://zenit.senecac.on.ca/wiki/index.php/SEC520 SEC520 WIKI]
::* [https://scs.senecac.on.ca/course/sec520 Course Outline]
::* Required Materials are listed in your Supplies Checklist. Other materials and references are noted week by week.
|
:'''Lab 1:'''
::Set-Up for Labs:
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_1.html Setup Hard Disk Pack for Labs]
|- valign="top"
|
:'''Week 2'''
|
::::*User Information
::::*Verification
|
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w1_l2.ppt ppt] ] Penetration Testing: Reconnaissance
::*[http://www.youtube.com/watch?v=NDQffaAMLQc Reconnaissance]
|
:'''Lab 2:'''
::Pentration Testing:
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_2.html Reconnaissance]
|- valign="top"
|
:'''Week 23'''
|
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w2_l1.ppt ppt] ] Scanning & Enumeration
:'''Reading References:'''
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Scanning 1] , [http://www.youtube.com/watch?v=WKLNAAt57Wg Scanning 2]
::*[http://www.youtube.com/watch?v=_Ch0RJlHFBo Enumeration]
::*[https://www.youtubepentest-tools.com/watch?v=FMgAIfcPsyw Vulnerability Testing network-vulnerability- Overview]::*[https:scanning//www.youtube.com/watch?v=lNjxwvQTtcp-port-scanner-online-nmap Online Pen-os NessusTest Scanner]::*[httphttps://www.youtube.com/watch?v=TfZt70TYujg dR7NTYfmNcA Prep for Metasploit]
:'''Resources:'''
::*[http://nmap.org/book/man.html Nmap Reference Guide] <br />(How to use '''nmap''' utility to scan ports)
:'''Lab 3:'''
::Penetration Testing / Continued:
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_3.html Scanning, Enumeration, & Vulnerability Testing]
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
<div style="float: left; margin-left: -40px;"></div>
</div>
:'''Assignment #1 Posted:Week 4'''::*Details: N/A
|
:'''Scanning, Enumeration, & Vulnerability Testing:'''
::*Vulnerability Testing
|
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1sec520_w2_l2.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1sec520_w2_l2.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1sec520_w2_l2.ppt ppt] ] Linux Hardening (part 1) Vulnerability Testing
:'''Reading References:'''
::*[http://lcweblibcat.senecac.on.ca:2063/0596003919 Linux Security Cookbook vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 4 - Pages: 3)
:'''YouTube Videos:'''
::*Linux Hardening:::[httphttps://www.youtube.com/watch?v=GJMKgV8V4FI Part1FMgAIfcPsyw Vulnerability Testing - Overview] | [http:://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | *[httphttps://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3lNjxwvQT-os Nessus]::*[httphttps://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAMhRxOW37MRwc Accessing System Via Metasploit (web-browser)]
:'''Resources:'''
::* [httphttps://www.ibmyoutube.com/developerworkswatch?v=r4Qq2eVjiP0 Setting up the Metasploit database]::*[https://linuxwww.youtube.com/librarywatch?v=x01ZErjNlX0 First Metasploit Payload]::*[http:/l-pam/indexwww.html Understanding and Configuring PAMyoutube.com/watch?v=jJd5qg3fkyw Using Armitage] (Metasploit Framework)]
|
:'''Lab 43:'''::System Hardening::*[https://scs.senecac.Continue Working on.ca/~fac/sec520/labs/SEC520_Lab_4.html Linux System Hardening (part 1)]'''Lab 3'''
|- valign="top"
|
:'''Week 45'''|
|
:'''Slides (Concepts):'''
::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1sec520_w7_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1sec520_w7_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1sec520_w7_l1.ppt ppt] ] Linux Hardening (part 2) Types of Attacks
:'''YouTube Videos:'''
::*[http://www.youtube.com/watch?v=6piQXXHTmqk ACLsZUygX8TBBw0 Phishing]::*[http://www.youtube.com/watch?v=fpXuWhshKVA SELinuxPqfZM3Lxrmg Malicious Payload]::*[http://www.youtube.com/watch?v=imnEUvvDxc4 Sudo-hd7XG-b6uk IP Spoofing]::*[http://www.youtube.com/watch?v=4Icg3MYZZqI Cron JobsAhTfo6pWBIM Database Injection]::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking]
:'''Reading References:'''
::*[http://lcweblibcat.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br vwebv/>holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (Chapter 5 E- Pages: book)::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: Chapters 4,5,6)
:'''Resources:'''
::* [http://wwwatlas.linuxquestionsarbor.orgnet/linux/answers/security/acls_extended_filepermissions How to Use ACLsATLAS Web-page]::* SELinux(Active Threat Level Analysis System)::* [http://www.sudosans.wsorg/sudotop-cyber-security-risks/introsummary.html Sudo In a Nutshellphp Top Security Risks 2009 (SANS Institute)]|::*[https://github.com/WebGoat/WebGoat/wiki Webgoat]
|
<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;">
<div style="float: left; margin-left: -40px;"></div>
<div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan any server.<br /><br /></ol></div>
</div>
|- valign="top"
|
:'''Week 6'''
More on mysql injection and Webgoat
|
::* [[https://www.youtube.com/watch?v=Rqt_BgG5YyI Blind MySQL injection video]]'''Moved until after the break''':'''Hardening Windows 7/8/10'''::*Installing and Configuring Security Configuration Wizard::*Using New Technology File System (NTSF)::*Configuring Automatic Updates :'''Assignment Test #1 Due:Details, March 6th'''::* Assignment Submission Instructions# Quiz 2 (February 22)
|
:'''YouTube Videos:'''
::*[]
:'''Midterm (Test #1)Resources:'''::*Test Details
:'''Assignment #1:'''
::* Assignment Instructions (N/A)
::Continue working on '''Lab 4''' and install Webgoat
|
:'''Week 7'''
:'''Types of AttacksMidterm (Test #1 March 6th):'''::*Client-side Attacks:::*Phishing:::*Webbrowser - Malicious Payloads:::*IP Spoofing (Man in the MiddleCheck course announcements for test details) / Password::*Server-side Attacks:::*Out-dated Software Patches:::*Database Injection:::*Password Cracking
| :'''Additional Tasks:''':'''Reading ReferencesLab 5:'''::* [http:'''Hardening Windows 7/8/libcat.senecac.10'''::Work on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)''Assignment #1'''
|- valign="top"
|
:'''Lab 6:Week 8''':'''Attack Categories:'''<div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; margin-left:15px; margin-right:10px; padding-left: 20px;"><div style="float: left; margin-left: -40px;"></div><div><b>WARNINGS!</b><br /><ol><li>'''Scanning ports must require the permission of Server Owner''' (preferably in writing). Student must either work in Security lab to scan each others' ports, or sign an agreement to scan the Tank server within or outside Seneca College.<br /><br /><li>'''Your instructor will hand-out permission forms to allow students to obtain Tank accounts, and allow students to perform ethical "penetration testing" on that server'''. Students <b><u>must</u></b> sign this form, hand back to the instructor, and await further instructions before proceeding with penetration testing on the tank server</li></ol></div></div>
:'''Types of Penetration Testing'''
::*Network
::*Access Control
::*Infrastructure / Patching
::*Physical/Building Security
::*Social Engineering
|
|
:'''Slides (Concepts)Lab 6:'''::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w8_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w8_l1.pdf pdf] ] [ [http://cs.senecac.Work on.ca/~fac/sec520/slides/sec520_w8_l1.ppt ppt] ] Hardening vulnerable Windows7 VM CTF
:'''Lab 7:Assignment #1 Due'''::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_7.html Hardening Windows 2003 Server]
:'''Intrusion Detection:Passwords, Pwn'ing, & Pillaging'''::*Purpose::*Logs::*Monitoring::*Iptables::*Using Tripwire
:'''Slides (Concepts):See Blackboard'''::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.ppt ppt] ] Intrusion Detection / Using Tripwire
|
:'''Lab 7:'''
::Continue to work on vulnerable Windows 7 VM CTF
|- valign="top"
|
:'''Additional Considerations:Metasploit and Metasploitable 2'''::*Decoys: Honey-Pots::*DMZs::*Disaster Recovery::*The BIGGER Picture
|
|
:'''Labs:'''
|
:'''Week 11'''
|
|
:'''Lab 8:'''
:'''Work on Assignment #2 Evaluation:'''::*PresentationsComplete Report::*Evaluate Secured System
|
|
:'''Assignment #2 Due:'''
|- valign="top"