Differences between revisions 22 and 62 (spanning 40 versions)
Revision 22 as of 2009-11-04 02:20:13
Size: 1802
Editor: 24-183-238-75
Comment:
Revision 62 as of 2013-09-11 13:31:28
Size: 1793
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
Before you get too involved with looking at what we plan to do this semester, you need to look at '''what you should already know'''. Take a look at [[NetworkSecurity/Prerequisites]]. {{http://imgs.xkcd.com/comics/cryptography.png}}
Line 8: Line 8:
Below is a list of areas we will look at in NetworkSecurity This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]].
For information on '''what you should already know''', take a look at [[NetworkSecurity/Prerequisites]].
Line 10: Line 11:
   * [[NetworkSecurity/Lab]]
   * [[NetworkSecurity/Tools]]
   * [[NetworkSecurity/Hacking]]
   * [[NetworkSecurity/Encryption]]
   * In the past we have used [[NetworkSecurity/WebScarab|Web scarab]]
== Topics, Resources and Ideas for the future ==
Line 16: Line 13:
   * /NetworkSecurityEssentials4 notes from the book used in 2013.
   * [[/Lab]]
   * [[/Tools]]
   * [[/Programs]]
   * [[/Hacking]]
   * [[/Encryption]]
   * [[/Spam]]
   * [[/FireWall]]
   * [[/Topics]]
   * [[/SageIdeas]]
   * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]] from AMS/MAA conference 2011 by Dr. Don Spickler.
   * [[http://www.backtrack-linux.org/|Backtrack Penetration Testing]]
   * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox.
   * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]]
   * [[http://osvdb.org/|Open Source Vulnerability Database]]
   * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]]
   * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]].
Line 20: Line 34:
'''Required Books''' '''Recommended Additional Books'''
Line 23: Line 37:
   * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
      * Each student will be responsible for presenting a chapter from this book.
      * Each student will be responsible for demonstrating an attack related to the chapter they present.
   * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
      * Each student must read this New York Times Best Seller.
      * Cryptography will be studied in conjunction with the assigned chapters.
   * Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
      * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
      * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
      * Dr. A will do all the lecturing on these topics.
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]]
   * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]]
Line 35: Line 39:
== Past Year Class Pages ==
Line 36: Line 41:


'''Recommended Book(s)'''

   * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7
   

----
CategoryHomepage
   * /Cptr427Winter2010

CPTR 427 Network Security Class Wiki

http://imgs.xkcd.com/comics/cryptography.png

This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

Topics, Resources and Ideas for the future

Books Used in this Class

Recommended Additional Books

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)