Differences between revisions 28 and 62 (spanning 34 versions)
Revision 28 as of 2010-10-12 20:52:55
Size: 2239
Editor: 71-87-243-6
Comment:
Revision 62 as of 2013-09-11 13:31:28
Size: 1793
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
This page contains information about Network Security CPTR 427. For past classs check the bottom of this page for links. {{http://imgs.xkcd.com/comics/cryptography.png}}
Line 8: Line 8:
This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]].
For information on '''what you should already know''', take a look at [[NetworkSecurity/Prerequisites]].
Line 9: Line 11:
== Topics, Resources and Ideas for the future ==
Line 10: Line 13:

Before you get too involved with looking at what we plan to do this semester, you need to look at '''what you should already know'''. Take a look at [[NetworkSecurity/Prerequisites]].



Below is a list of areas and resources we will look at in NetworkSecurity

   * [[NetworkSecurity/Lab]]
   * [[NetworkSecurity/Tools]]
   * [[NetworkSecurity/Hacking]]
   * [[NetworkSecurity/Encryption]]
   * [[NetworkSecurity/FireWall]]
   * /NetworkSecurityEssentials4 notes from the book used in 2013.
   * [[/Lab]]
   * [[/Tools]]
   * [[/Programs]]
   * [[/Hacking]]
   * [[/Encryption]]
   * [[/Spam]]
   * [[/FireWall]]
   * [[/Topics]]
   * [[/SageIdeas]]
   * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]] from AMS/MAA conference 2011 by Dr. Don Spickler.
Line 23: Line 25:
   * In the past we have used [[NetworkSecurity/WebScarab|Web scarab]]    * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox.
Line 26: Line 28:
   * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]]
   * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]].
Line 30: Line 34:
'''Required Books''' '''Recommended Additional Books'''
Line 33: Line 37:
   * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
      * Each student will be responsible for presenting a chapter from this book.
      * Each student will be responsible for demonstrating an attack related to the chapter they present.
   * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
      * Each student must read this New York Times Best Seller.
      * Cryptography will be studied in conjunction with the assigned chapters.
   * Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
      * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
      * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
      * Dr. A will do all the lecturing on these topics.
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]]
   * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]]
Line 45: Line 39:
== Past Year Class Pages ==
Line 46: Line 41:


'''Recommended Book(s)'''

   * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7

Past Year Class Pages.

   * Cptr427Winter2010

----

CategoryHomepage
   * /Cptr427Winter2010

CPTR 427 Network Security Class Wiki

http://imgs.xkcd.com/comics/cryptography.png

This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

Topics, Resources and Ideas for the future

Books Used in this Class

Recommended Additional Books

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)