| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

View
 

Course Lectures

Page history last edited by Patrick 2 weeks, 2 days ago

CIS4360 Lectures Page

 

Lectures that are useful for the materials in this course will be posted on this page. In addition to lectures produced for this class, this page also include lectures from other courses.

 

I strongly suggest you download the video lectures to your computer, that way you can view the video on your host system and have access to it at any time (even when you are offline).  Also, run the video in your host system (Windows, whatever) and have your VM open while I work through the video. Pause the video and duplicate what I've done. Does it work? Great! You're doing it correctly. Doesn't work? You're doing it wrong!  Now have fun!

 

Topics 

 

Link to Lecture Page

Introduction to the Course

  
 

 

 

 

  1
  • How to create a virtual machine and install Linux Mint within the 'VM.'  This lecture explains how to install and use VMWare on your host machine. What a COOL thing it is to be able to run multiple operating systems, even multiple NETWORKS on your desktop!
 

Installing Linux Mint in VMWare

Introduction to Computer and Network Security

  1

Introduction to computer and network security:

 

  • Why it's important, security problems, types of 'attacks,' CIANA.
 

Introduction to Computer and Network Security

  2

Risk analysis:

 

  • Defining assets in a risk analysis, identifying threats and the likelihood of the threats occurring, identifying the consequences of a threat occurring, and vulnerabilities that increase risk.

  • Also covers common safeguards to reduce the impact of threats, securing equipment/data, and incident response (should be included in security policy).
 

Risk Analysis

  3

Legal aspects of computer security

 

  • Guest lecturer Prof. Mark Pollit (FBI-retired) discusses laws related to computer and network security.
  Laws  

Authentication

  1

Authentication: 

  • Types of authentication, biometrics, detailed explanation of password hashing, examples of bad password choices, password cracking methods, network access controls, and coverage of password security on Unix and Windows systems.
  Authentication
  2

Access control

  • This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.
  AccessControl
  3

Password auditing: 

 

  • Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.
  Password auditing
  4

Rainbow tables:

 

  • Extended coverage of rainbow tables and Ophcrack software.
  Password Auditing with Rainbow Tables
   

Project: Password Policies and Auditing

(due date listed on Falcon Online)

 
 

Network Security: Packet Capture Analysis

  1

Review of TCP/IP: (2 videos)

 

  • TCP/IP fundamentals, the OSI model, TCP vs UDP, application protocols, IP addressing, NAT, and an overview of proxy servers.
  Review of TCP/IP
  2

Network signature analysis:

 

  • Signature analysis, brief introduction to the Snort IDS, analysis of ICMP packet capture, common TCP/UDP ports, network baselining, the TCP 3-way handshake, and review of TCP flags.
  Identifying Network Signatures from Packet Captures
  3

Network signature analysis example:

 

  • ARP Spoofing
  ARP Spoofing 
  4

Honeypots

  • A honeypot is a computer security system used to detect, deflect, or, in some manner, counteract attempts at unauthorized use of an information system or computer.  In this video I discuss honeypots and how they are used to defend your network. In particular the technology is useful for identifying and monitoring insider threats, which is the number one threat vector for most networks.
  Honeypots 
    Project: Network Security-Analyzing Packet Capture
   

Firewalls

   
  1

Introduction to Firewalls:

 

  • An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy.
  • In the readings you will learn about DMZs and proxy servers. 

 

  Introduction to Firewalls
   

Firewalls with iptables

  • In this lecture I discuss using iptables
  iptables
  3

Creating a host-only network in VMWare:

 

  • Create a network in VMWare for a host-only network (i.e., not connected to the Internet, great for running security and forensics sensitive experiments).
  Creating a host-only network
  4

Firewall Assignment Setup

 

  • Here I walk you through how to setup your VM for the firewall assignment.
 

Setup for Firewall Assignment

 

    Project: Firewall with IPTables
   

Intrusion Detection 

  1

Introduction to Intrusion Detection:

 

  • Types of IDS's, overview and usage of the Snort IDS, Snort modes and various run options.
  Introduction to Intrusion Detection
  2

Implementing Intrusion Detection:

 

Implementing a network security policy using SNORT.

 

  Implementing Intrusion Detection
  3

Installing and Testing SNORT:

 

  • Installing and testing SNORT.

 

  Installing and Testing SNORT IDS
  4

SNORT Rules:

 

  • How to create SNORT rules based on a security policy.
  Creating SNORT Rules
    Project: Intrusion Detection with SNORT
   

VPNs

   
  1

Introduction to VPNs:

  • Discussion of VPN architectures and uses, encapsulation, encryption, authentication.
  VPNs
Cryptography
  1

Introduction to Cryptography:

  • Explanation of symmetric (single key) and asymmetric (public/private key) encryption, GnuPG (GPG) basics.
  Intro to Crypto
  2

Using GPG:

 

  • Using GPG to implement cryptographic functions.
  Using GPG
    Project: Encryption
   
 

 

Comments (0)

You don't have permission to comment on this page.