1938
Comment:
|
2368
|
Deletions are marked like this. | Additions are marked like this. |
Line 4: | Line 4: |
= CPTR 427 Network Security Class Wiki = | = CPTR 427 Network Security = |
Line 6: | Line 6: |
This page contains general information about security. For your specific class check the list below: | <<TableOfContents>> |
Line 8: | Line 8: |
* Cptr427Winter2010 | [[http://imgs.xkcd.com/comics/cryptography.png|width=100]] |
Line 10: | Line 10: |
== Course Description | |
Line 11: | Line 12: |
Before you get too involved with looking at what we plan to do this semester, you need to look at '''what you should already know'''. Take a look at [[NetworkSecurity/Prerequisites]]. | This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]]. For information on '''what you should already know''', take a look at [[NetworkSecurity/Prerequisites]]. |
Line 13: | Line 14: |
== Topics, Resources and Ideas for the future == * /NetworkSecurityEssentials4 notes from the book used in 2013. * [[/Lab]] * [[/Nebula|Nebuala, a nice beginner hacking tutorial]] * [[https://www.offensive-security.com/metasploit-unleashed/|Metasploit course - free]] * [[/Tools]] * [[http://academic.comptiastore.com/|CompTIA Academic Marketplace]] * [[/Programs]] * [[/Spam]] * /FireWall * [[/Topics]] * /SageIdeas * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]] from AMS/MAA conference 2011 by Dr. Don Spickler. * [[http://www.backtrack-linux.org/|Backtrack Penetration Testing]] * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox. * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]] * [[http://osvdb.org/|Open Source Vulnerability Database]] * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]] * [[http://exploit-db.com/]] Once upon a time there was a site called Milw0rm.com and it was great! But the maintainer passed away and eventually it was taken over by http://exploit-db.com/. * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]]. |
|
Line 14: | Line 35: |
== Materials Used in this Class == '''Recommended AdditionalReading''' |
|
Line 15: | Line 38: |
Below is a list of areas we will look at in NetworkSecurity | * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free) * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]] * [[http://www.tomsitpro.com/articles/information-security-certifications,2-205.html|Security Certifications]] |
Line 17: | Line 42: |
* [[NetworkSecurity/Lab]] * [[NetworkSecurity/Tools]] * [[NetworkSecurity/Hacking]] * [[NetworkSecurity/Encryption]] * In the past we have used [[NetworkSecurity/WebScarab|Web scarab]] |
== DES Hints == |
Line 23: | Line 44: |
* http://www.cs.bham.ac.uk/research/projects/lemsys/DES/DESPage.jsp | |
Line 24: | Line 46: |
== Books Used in this Class == '''Required Books''' * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf | Snort Manual]] (Free) * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3 * Each student will be responsible for presenting a chapter from this book. * Each student will be responsible for demonstrating an attack related to the chapter they present. * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323 * Each student must read this New York Times Best Seller. * Cryptography will be studied in conjunction with the assigned chapters. * Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4 * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec) * Dr. A will do all the lecturing on these topics. * Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]] '''Recommended Book(s)''' * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7 ---- CategoryHomepage |
== Past Year Class Pages == * /Cptr427Winter2010 |
CPTR 427 Network Security
Contents
== Course Description
This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.
Topics, Resources and Ideas for the future
/NetworkSecurityEssentials4 notes from the book used in 2013.
Cryptotools from AMS/MAA conference 2011 by Dr. Don Spickler.
Two proxy tools that allow editing and observing http(s) are Web scarab and Paros Proxy - there is also some nice proxies specifically for firefox.
http://exploit-db.com/ Once upon a time there was a site called Milw0rm.com and it was great! But the maintainer passed away and eventually it was taken over by http://exploit-db.com/.
Back in the stone age (relatively speaking of course) Dr. A took a course called Csce877.
Materials Used in this Class
Recommended AdditionalReading
DES Hints