Topics
|
|
Link to Lecture Page
|
Introduction to the Course
|
|
|
|
|
|
|
1 |
- How to create a virtual machine and install Linux Mint within the 'VM.' This lecture explains how to install and use VMWare on your host machine. What a COOL thing it is to be able to run multiple operating systems, even multiple NETWORKS on your desktop!
|
|
Installing Linux Mint in VMWare
|
Introduction to Computer and Network Security
|
|
1 |
Introduction to computer and network security:
- Why it's important, security problems, types of 'attacks,' CIANA.
|
|
Introduction to Computer and Network Security
|
|
2 |
Risk analysis:
- Defining assets in a risk analysis, identifying threats and the likelihood of the threats occurring, identifying the consequences of a threat occurring, and vulnerabilities that increase risk.
- Also covers common safeguards to reduce the impact of threats, securing equipment/data, and incident response (should be included in security policy).
|
|
Risk Analysis
|
|
3 |
Legal aspects of computer security
- Guest lecturer Prof. Mark Pollit (FBI-retired) discusses laws related to computer and network security.
|
|
Laws |
Authentication
|
|
1 |
Authentication:
- Types of authentication, biometrics, detailed explanation of password hashing, examples of bad password choices, password cracking methods, network access controls, and coverage of password security on Unix and Windows systems.
|
|
Authentication |
|
2 |
Access control
- This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.
|
|
Access Control |
|
3 |
Password auditing:
- Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.
|
|
Password auditing |
|
4
|
Rainbow tables:
- Extended coverage of rainbow tables and Ophcrack software.
|
|
Password Auditing with Rainbow Tables
|
|
|
Project: Password Policies and Auditing
(due date listed on Falcon Online)
|
|
|
Network Security: Packet Capture Analysis
|
|
1 |
Review of TCP/IP: (2 videos)
- TCP/IP fundamentals, the OSI model, TCP vs UDP, application protocols, IP addressing, NAT, and an overview of proxy servers.
|
|
Review of TCP/IP |
|
2 |
Network signature analysis:
- Signature analysis, brief introduction to the Snort IDS, analysis of ICMP packet capture, common TCP/UDP ports, network baselining, the TCP 3-way handshake, and review of TCP flags.
|
|
Identifying Network Signatures from Packet Captures |
|
3 |
Network signature analysis example:
|
|
ARP Spoofing |
|
4 |
Honeypots
- A honeypot is a computer security system used to detect, deflect, or, in some manner, counteract attempts at unauthorized use of an information system or computer. In this video I discuss honeypots and how they are used to defend your network. In particular the technology is useful for identifying and monitoring insider threats, which is the number one threat vector for most networks.
|
|
Honeypots |
|
|
Project: Network Security-Analyzing Packet Capture
|
|
|
Firewalls
|
|
|
|
1 |
Introduction to Firewalls:
- An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy.
- In the readings you will learn about DMZs and proxy servers.
|
|
Introduction to Firewalls |
|
|
Firewalls with iptables
- In this lecture I discuss using iptables
|
|
iptables |
|
3 |
Creating a host-only network in VMWare:
- Create a network in VMWare for a host-only network (i.e., not connected to the Internet, great for running security and forensics sensitive experiments).
|
|
Creating a host-only network |
|
4 |
Firewall Assignment Setup
- Here I walk you through how to setup your VM for the firewall assignment.
|
|
Setup for Firewall Assignment
|
|
|
Project: Firewall with IPTables
|
|
|
Intrusion Detection
|
|
1 |
Introduction to Intrusion Detection:
- Types of IDS's, overview and usage of the Snort IDS, Snort modes and various run options.
|
|
Introduction to Intrusion Detection |
|
2 |
Implementing Intrusion Detection:
Implementing a network security policy using SNORT.
|
|
Implementing Intrusion Detection |
|
3 |
Installing and Testing SNORT:
- Installing and testing SNORT.
|
|
Installing and Testing SNORT IDS
|
|
4 |
SNORT Rules:
- How to create SNORT rules based on a security policy.
|
|
Creating SNORT Rules
|
|
|
Project: Intrusion Detection with SNORT
|
|
|
VPNs
|
|
|
|
1 |
Introduction to VPNs:
- Discussion of VPN architectures and uses, encapsulation, encryption, authentication.
|
|
VPNs |
Cryptography |
|
1 |
Introduction to Cryptography:
- Explanation of symmetric (single key) and asymmetric (public/private key) encryption, GnuPG (GPG) basics.
|
|
Intro to Crypto |
|
2 |
Using GPG:
- Using GPG to implement cryptographic functions.
|
|
Using GPG |
|
|
Project: Encryption (Check Announcement on Falcon Online)
|
|
|
|
Comments (0)
You don't have permission to comment on this page.