CNIT 140: IT Security PracticesFall 2016 - Sam BowneScoresSchedule · Lecture Notes · Projects · Links · Home Page |
|
Purpose of ClassTraining students for cybersecurity competitions, including CTF events and the Collegiate Cyberdefense Competition (CCDC). This training will prepare students for employment as security professionals, and if our team does well in the competitions, the competitors will gain recognition and respect which should lead to more and better job offers.The primary focus of this class is hands-on defense of systems. Students will work in groups configuring servers, firewalls, routers, switches, and other systems to resist attacks. Online AttendeesWe will use videoconferencing, Slack, and other tools vigorously to ensure that students who cannot physically attend the class are able to participate as much as possible in the training and competitions.TextbookThere will be no textbook. We will use online tutorials and presentations instead.Catalog DescriptionThis course explores techniques used by hackers to access protected data. Students will learn about cybercrime laws, penalties and organizations defending civil liberties of citizens. Students will learn about the various methodologies hackers use to gain access to confidential data such stealthy network recon, passive traffic identification, etc. CSUAdvisory: CNIT 123 or equivalent familiarity with hacking techniques |
Schedule (may be revised) | |||||
---|---|---|---|---|---|
Date | Report | Topic | |||
Sat 8-13 |
|
||||
Sat 8-20 | 1. Networking | ||||
Sat 8-27 | Progress Plan Due | 2. Perimeter Security | |||
Fri 9-2 | Last day to add | ||||
Sat 9-3 | Holiday: No Class | ||||
Sat 9-10 | 3. Flashing/Patching; REGISTER FOR WRCCDC | ||||
Sat 9-17 | Report 1 Due | 4: Unix | |||
Sat 9-24 | 5. Windows | ||||
Sat 10-1 | Class cancelled for Code Camp | ||||
Sat 10-8 | The Penetration Testing Execution Standard | ||||
Sat 10-15 | Report 2 Due | Windows Internals | |||
Sat 10-22 |
Fail2Ban PHP Security Auth Logs IPTstate |
||||
Sat 10-29 | CCDC Info & Rekall | ||||
Sat 11-5 | |||||
Sat 11-12 | Report 3 Due |
CCDC PlansThree teams: Windows, Linux, Palo AltoBy Next Week1. 1. Make VMs of the machines2. Prepare cheat sheet for securing them 3. Demonstrate ability to secure them in 15 min. | |||
Sat 11-19 | CCDC Prep Schedule:
Mon 11-21 4 PM meet in S214
Mon 11-28 4 PM meet in S214
| ||||
Sat 11-26 | Holiday: No Class | ||||
Sat 12-3 | Report 4 Due | Last Class: TBA | |||
Sat 12-10 | Final Exam Day: Make-Up & Extra Credit |
Lecture Topics (May Be Revised) | |
---|---|
Grading Policy
Tim Krugh's Slides (ODP) · Tim Krugh's Lecture (YouTube) 1. Networking -- Traffic flow, switching, and routing. · KEY · PDF 2. Perimeter Security -- Network and Host based firewalls, how they work and how to configure them, as well as Intrusion Detection Systems, Virtual Private Networks, and DMZs.· KEY · PDF Write-Up for "Judgement", from Tokyo Westerns / MMA CTF 2nd 2016
3. Flashing/Patching -- Both Hardware and Software Flashing/Patching NECCDC Materials & Rekall KEY · PDF 4. UNIX -- Multiple flavors of UNIX such as Fedora Core, Solaris, Gentoo, BSD, Ubuntu, etc. 5. Windows Workstations and Servers -- NT, 2000, 2008, 2012, XP, 7, 8, 10 6. User Management -- Adding and deleting users on multiple Operating Systems and managing those user accounts 7. Services and Applications -- Email, DNS, HTTP, HTTPS, SQL, Web applications 8. Tools - Port Scanners, Vulnerability Scanners, MD5, and Software based firewalls and IDSs. 9. Authentication -- Beyond just knowing how to change passwords in multiple environments, also understanding other forms of authentication such as multi-factor, biometrics, and tokens 10. General - Performing admin duties such as installing, securing, updating, troubleshooting, and maintaining the functionality of computer systems on a network.
Click a lecture name to see it on SlideShare. If you want to use other formats, you may find this useful: Cloud Convert. |
Projects (under development) | |
---|---|
Palo Alto Virtual Firewall
Downloading the Virtual Machines
Suggested Project Topics
Networking EquipmentConfiguring routers and switches; using Packet TracerConfiguring firewalls Windows ServersCommon Services: IIS, SQL Server, Exchange, and Domain ControllersFinding and Patching Vulnerabilities: MBSA Linux ServersEssential Versions: Ubuntu, Fedora, FreeBSD, and SolarisServices: Apache, Bind, and Sendmail ProtocolsHTTP, HTTPS, DNS, SMTP, POP3, SSH, FTP, SQLIntrusion DetectionSnort, Splunk, Configuring Logging, Network MonitoringInjectsMigrate a Website from IIS to Apache | |
Tools (may be revised)Assessment Tools:Kali, Codescout, Metasploit Framework, Microsoft Baseline Security Analyzer, Nessus, Netcat, Nikto, Nmap, Paros Proxy, Superscan Forensics Utilities: Coroners Toolkit DNS Utilities: Dig, Nslookup, Whois Packet Analysis: Ettercap, TCPDUMP, Wireshark Compression Utilities: Gzip, 7-Zip, Tar, Zip Perimeter Security: Iptables/TCP Wrappers, Snort Password Auditing: John the Ripper, L0pht Crack, Cain and Abel Miscellaneous Tools: GCC, Make, MD5, Microsoft Update, Nagios, PGP, PHPMyAdmin Ping, Sysinternals, Traceroute, Tripwire Training: Hackme Bank, Books, Casino, Shipping, or Travel, WebGoat, WebMaven |