Differences between revisions 17 and 71 (spanning 54 versions)
Revision 17 as of 2009-11-04 02:17:17
Size: 1798
Editor: 24-183-238-75
Comment:
Revision 71 as of 2017-11-29 00:30:50
Size: 2319
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
{{http://imgs.xkcd.com/comics/cryptography.png}}
Line 6: Line 7:
Before you get too involved with looking at what we plan to do this semester, you need to look at '''what you should already know'''. Take a look at [[NetworkSecurity/Prerequisites]]. This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]]. For information on '''what you should already know''', take a look at [[NetworkSecurity/Prerequisites]].
Line 8: Line 9:
Below is a list of areas we will look at in NetworkSecurity == Topics, Resources and Ideas for the future ==
 * /NetworkSecurityEssentials4 notes from the book used in 2013.
 * [[/Lab]]
   * [[/Nebula|Nebuala, a nice beginner hacking tutorial]]
   * [[https://www.offensive-security.com/metasploit-unleashed/|Metasploit course - free]]
 * [[/Tools]]
 * [[http://academic.comptiastore.com/|CompTIA Academic Marketplace]]
 * [[/Programs]]
 * [[/Spam]]
 * /FireWall
 * [[/Topics]]
 * /SageIdeas
 * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]] from AMS/MAA conference 2011 by Dr. Don Spickler.
 * [[http://www.backtrack-linux.org/|Backtrack Penetration Testing]]
 * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox.
 * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]]
 * [[http://osvdb.org/|Open Source Vulnerability Database]]
 * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]]
 * [[http://exploit-db.com/]] Once upon a time there was a site called Milw0rm.com and it was great! But the maintainer passed away and eventually it was taken over by http://exploit-db.com/.
 * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]].
Line 10: Line 30:
   * [[NetworkSecurity/Lab]]
   * [[NetworkSecurity/Tools]]
   * [[NetworkSecurity/Hacking]]
   * [[NetworkSecurity/Encryption]]
   * In the past we have used [[NetworkSecurity/WebScarab|Web scarab]]
== Materials Used in this Class ==
'''Recommended AdditionalReading'''
Line 16: Line 33:
 * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free)
 * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]]
 * [[http://www.tomsitpro.com/articles/information-security-certifications,2-205.html|Security Certifications]]
Line 17: Line 37:
== DES Hints ==
Line 18: Line 39:
== Books Used in this Class ==  * http://www.cs.bham.ac.uk/research/projects/lemsys/DES/DESPage.jsp
Line 20: Line 41:
'''Required Books'''

   * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free)
   * Hacking Exposed 6th Ed. ISBN:978-0-07-161374-3
      * Each student will be responsible for presenting a chapter from this book.
      * Each student will be responsible for demonstrating an attack related to the chapter they present.
   * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
      * Each student must read this New York Times Best Seller.
      * Cryptography will be studied in conjunction with the assigned chapters.
   * Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
      * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
      * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
      * Dr. A will do all the lecturing on these topics.
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be divided between
      *




'''Recommended Books'''

   * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7


   * IpSec
----
CategoryHomepage
== Past Year Class Pages ==
 * /Cptr427Winter2010

CPTR 427 Network Security Class Wiki

http://imgs.xkcd.com/comics/cryptography.png

This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

Topics, Resources and Ideas for the future

Materials Used in this Class

Recommended AdditionalReading

DES Hints

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)