Note: The chapters are taken from the required textbook. Additional links and reading from internet sources will be added.
Week | Topics | Reading |
1 | Intro: Syllabus, Attacks and Defense Mechanisms [slides], Pen Testing Lab Setup | Ch. 1, 2 Intro to Pen testing textbook, OWASP Attack Categorization, Trusting Trust |
2 | Vulnerability Assessment, Threat Model, STRIDE [slides] | Vulnerability Assessments: The Pro-active Steps to Secure Your Organization |
Reconnaisance Lab | Ch. 3, ch. 5 GW, Attack Trees | |
3 | Network Nuts and Bolts [slides], Research in Cybersecurity [slides], Lab: Edurange & GENI setup account | SANS Computer Networks Crash Course |
Network Nuts and bolts (continued) | ||
4 | Network Nuts and bolts (continued), Scanning Lab | SANS video tutorials (scroll down to the "Networking" section) |
Project Proposal Presentations | ||
5 | IDS [slides] | IDS tutorial |
IDS | ||
6 | IPS [slides], Firewalls [slides] | ch. 21 Sec Engr book |
Network Attacks [slides], Command Line Lab | ||
7 | DDoS Lab, Network Attacks [slides] | |
DDoS Lab, Network Attacks [slides] | ||
8 | Midterm Review, Network Security Protocols [slides] | |
Midterm | ch. 4: "Exploitation" | |
9 | Spring Break | |
Spring Break | ||
10 | Metasploit video, Metasploit unleashed | |
Metasploit Q&A, Web App Exploits [slides] | ch. 6 | |
11 | Web App Exploits [slides] | |
SQL Injection lab, Project progress checkpoint | ||
12 | Stack Exploits & Secure programming [slides] | Smashing the stack for fun and profit |
Cryptography [slides] | ||
13 | Cryptography [slides] | |
Cryptography [slides] | ||
14 | Cryptography [slides] | RSA |
Cryptography | ||
15 | Hashing [slides], IPSec [slides] | |
IPSec, Social Engineering[slides], Maltego tutorial | ch. 5 | |
16 | Legal and Ethical Issues in Cybersecurity [slides] | Homework solutions and class review [slides] |
Final Exam on May 2, 4-7 pm: Project Presentations |