Computer Information Security 2012

Course Documents

Tests

  • Final Exam Study Guide
  • Midterm Study Guide
  • The midterm must be taken in the CS advanced lab sometime Thrusday or Friday, starting during following times:
    • Thursday: 9:00am-12:00; 1:00pm-5:30pm
    • Friday: 8:00am-11:25am; 1:00pm-1:50pm; 3:00pm-3:10pm
    • You must have Dr. Kasper enter the password in the lab in order to start.
    • Each test is limited automatically to 1.5 hours.
    • The tests are closed book, notes, Internet, & friend.

Labs

Assignments

  1. March 28, Cybersecurity and the Government: Read the articles refered to in the calendar. Answer the following questions, turn into Moodle
    1. What is the elemental features of each bill.
    2. What are the primary disagreements between the two bills?
    3. What position do you take, and why?
    4. Be prepared to present your position in class.

Course Links

Backtrack Links

Readings

Videos

In the News

Software Resourses

Notes

Slides

Quizzes

Calendar

February 2012
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
      01 02
Class introduction
03
No Class
04
05 06
CH 1: Building a Secure Organization, Quiz
07 08
CH 2: Cryptography, Quiz
09
No Lab
10
Ch 3: Preventing System Intrusions, Quiz
11
12 13
Ch 4: Guarding Against Network Intrusions, Quiz
14 15
Ch 5: Unix and Linux Security, Quiz
16
No Lab
17
Ch 6: Eliminating the Security Weakness of Linux and UNIX Operating Systems, Quiz
18
19 20
Ch 7: Internet Securit, Quiz
21 22
Ch 8: The Botnet Problem, Quiz
23
Lab 1 - Scanning for vulnarabilities with NMAP
24
No Class!
25
26 27
Ch 9: Intranet Security
28 29
Ch 10: Local Area Network Security, Quzi
     

March 2012
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
        01
Lab 2 - Intrusion Detection 1
02
No Class
03
04 05
Ch 10 Continued, Quiz
06 07
Ch 11 Wireless Security, Quiz
08
Lab 3 - Intrusion Detection 2
09
No class
10
11 12
Ch 11 Wireless Security, Quiz
13 14
Midterm Review
15 16
Midterm, Advanced Lab
17
18 19 20 21 22 23 24
25 26
Ch 12 Cellular Network Security, Quiz
27 28
Read: Cybersecurity Bill, McCain cybersecurity bill 1, 2. See assignment above.
29
Snort-Inline Lab
30
No Class
31

April 2012
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
01 02
Final Project Presentation, Lab work
03 04
Ch 18 - Intrusion Prevention and Detection Systems, Quiz
05
Snort-Inline Lab Part 2
06
Easter Break
07
08 09
Easter Break
10 11
Ch 19 Computer Forensics Part 1, Quiz, Final Project Proposal Due
12
Snort-Inline Lab
13
No Class
14
15 16
Ch 21 Firewalls, Quiz
17 18
Ch 22 Penetration Testing, Quiz
19
Penetration Testing Lab - part 1
20
No Class
21
22 23
Ch 23 - What Is Vulnerability Assessment?, Quiz
24 25
Penetration Testing Lab - part 2, Final Project Draft, Progress Report Due
26
Penetration Testing Lab - part 3
27
No Class
28
29 30
No Class
         

May 2012
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
    01 02
Ch 26 - Public Key Infrastructure, Quiz
03
Blue-Green Day!
04
Ch 30 - Virtual Private Networks, Quiz, Final Project Report/Slides Due
05
06 07
Presentations
08 09
Presentations
10
Presentation
11
No Class!
12
13 14
Presentations, Final Exam Review
15
Final Exam 10:00-11:50. In Advanced CS Lab
16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31    

  • 2 Feb 2012 - Class introduction
  • 3 Feb 2012 - No Class
  • 6 Feb 2012 - CH 1: Building a Secure Organization, Quiz
  • 8 Feb 2012 - CH 2: Cryptography, Quiz
  • 9 Feb 2012 - No Lab
  • 10 Feb 2012 - Ch 3: Preventing System Intrusions, Quiz
  • 13 Feb 2012 - Ch 4: Guarding Against Network Intrusions, Quiz
  • 15 Feb 2012 - Ch 5: Unix and Linux Security, Quiz
  • 16 Feb 2012 - No Lab
  • 17 Feb 2012 - Ch 6: Eliminating the Security Weakness of Linux and UNIX Operating Systems, Quiz
  • 20 Feb 2012 - Ch 7: Internet Securit, Quiz
  • 22 Feb 2012 - Ch 8: The Botnet Problem, Quiz
  • 23 Feb 2012 - Lab 1 - Scanning for vulnarabilities with NMAP
  • 24 Feb 2012 - No Class!
  • 27 Feb 2012 - Ch 9: Intranet Security
  • 29 Feb 2012 - Ch 10: Local Area Network Security, Quzi
  • 1 Mar 2012 - Lab 2 - Intrusion Detection 1
  • 2 Mar 2012 - No Class
  • 5 Mar 2012 - Ch 10 Continued, Quiz
  • 7 Mar 2012 - Ch 11 Wireless Security, Quiz
  • 8 Mar 2012 - Lab 3 - Intrusion Detection 2
  • 9 Mar 2012 - No class
  • 12 Mar 2012 - Ch 11 Wireless Security, Quiz
  • 14 Mar 2012 - Midterm Review
  • 16 Mar 2012 - Midterm, Advanced Lab
  • 26 Mar 2012 - Ch 12 Cellular Network Security, Quiz
  • 28 Mar 2012 - Read: Cybersecurity Bill, McCain cybersecurity bill 1, 2. See assignment above.
  • 29 Mar 2012 - Snort-Inline Lab
  • 30 Mar 2012 - No Class
  • 2 Apr 2012 - Final Project Presentation, Lab work
  • 4 Apr 2012 - Ch 18 - Intrusion Prevention and Detection Systems, Quiz
  • 5 Apr 2012 - Snort-Inline Lab Part 2
  • 6 Apr 2012 - Easter Break
  • 9 Apr 2012 - Easter Break
  • 11 Apr 2012 - Ch 19 Computer Forensics Part 1, Quiz, Final Project Proposal Due
  • 12 Apr 2012 - Snort-Inline Lab
  • 13 Apr 2012 - No Class
  • 16 Apr 2012 - Ch 21 Firewalls, Quiz
  • 18 Apr 2012 - Ch 22 Penetration Testing, Quiz
  • 19 Apr 2012 - Penetration Testing Lab - part 1
  • 20 Apr 2012 - No Class
  • 23 Apr 2012 - Ch 23 - What Is Vulnerability Assessment?, Quiz
  • 25 Apr 2012 - Penetration Testing Lab - part 2, Final Project Draft, Progress Report Due
  • 26 Apr 2012 - Penetration Testing Lab - part 3
  • 27 Apr 2012 - No Class
  • 30 Apr 2012 - No Class
  • 2 May 2012 - Ch 26 - Public Key Infrastructure, Quiz
  • 3 May 2012 - Blue-Green Day!
  • 4 May 2012 - Ch 30 - Virtual Private Networks, Quiz, Final Project Report/Slides Due
  • 7 May 2012 - Presentations
  • 9 May 2012 - Presentations
  • 10 May 2012 - Presentation
  • 11 May 2012 - No Class!
  • 14 May 2012 - Presentations, Final Exam Review
  • 15 May 2012 - Final Exam 10:00-11:50. In Advanced CS Lab
jwright3@mvnu.edu;kadams1@mvnu.edu;gtaylor@mvnu.edu;mwasil@mvnu.edu;avarner@mvnu.edu;gkindle@mvnu.edu;jtennefo@mvnu.edu;mkraly@mvnu.edu;jwetzel1@mvnu.edu;tnelson@mvnu.edu;zbennet1@mvnu.edu;mhartzle@mvnu.edu

-- JimSkon - 2012-02-01

Topic attachments
I Attachment Action Size Date Who Comment
Pptxpptx Ch01-BuildingSecureOrg.pptx manage 356.7 K 2012-02-06 - 15:30 JimSkon Chapter 1 - Building a Secure Organization
Pptxpptx Ch03-PreventingSystemsIntrustions.pptx manage 287.7 K 2012-02-10 - 16:37 JimSkon Chapter 3
Pptxpptx Ch04-GuardingAgainstNetworkIntrusions.pptx manage 314.9 K 2012-02-13 - 19:47 JimSkon Chapter 4 - Guarding Against Network Intrusions
Pptxpptx Ch05-UnixandLinuxSecurity.pptx manage 245.2 K 2012-02-15 - 19:34 JimSkon CHapter 5 - Unix and Linux Security.pptx
Pptxpptx Ch06-UnixandLinuxSecurity.pptx manage 466.0 K 2012-02-24 - 16:25 JimSkon Chapter 6 - Unix and Linux Security Improvement
Pptxpptx Ch07-InternetSecurity.pptx manage 794.7 K 2012-02-24 - 16:25 JimSkon Internet Security
Pptppt Ch08BotnetProblem.ppt manage 2160.0 K 2012-02-24 - 16:26 JimSkon Ch 8: The Botnet Problem
Pptxpptx Ch09-InformationSecurityInOrganizations.pptx manage 789.3 K 2012-03-14 - 14:56 JimSkon CH09-Information Security in Organizations
Pptxpptx Ch10-LANSecurity.pptx manage 424.1 K 2012-03-14 - 14:57 JimSkon LAN Security
Pptxpptx Ch11-WirelessSecurity.pptx manage 876.6 K 2012-03-14 - 14:57 JimSkon CH11 - Wireless Security
Pptxpptx Ch12-CellularSecurity.pptx manage 836.9 K 2012-03-26 - 11:53 JimSkon Chapter 12 - Cellular Security
Pptxpptx Chap10-2Quiz.pptx manage 178.0 K 2012-03-14 - 15:00 JimSkon  
Pptxpptx Chap10Quiz.pptx manage 176.5 K 2012-03-14 - 15:00 JimSkon  
Pptxpptx Chap11Quiz.pptx manage 178.8 K 2012-03-14 - 15:00 JimSkon  
Pptxpptx Chap11Quiz2.pptx manage 178.8 K 2012-03-14 - 15:01 JimSkon  
Pptxpptx Chap9Quiz.pptx manage 295.2 K 2012-03-14 - 15:00 JimSkon  
Pptxpptx Chapt1Quiz.pptx manage 178.9 K 2012-02-06 - 16:38 JimSkon Chapter 1 Quiz
Pptxpptx Chapt2Quiz.pptx manage 178.8 K 2012-02-08 - 17:50 JimSkon Chapter 2 Quiz
Pptxpptx Chapt3Quiz.pptx manage 181.3 K 2012-02-13 - 09:23 JimSkon Chapter 3 Quiz
Pptxpptx Chapt4Quiz.pptx manage 184.2 K 2012-02-13 - 19:47 JimSkon Chapter 4 Quiz
Pptxpptx Chapt5Quiz.pptx manage 179.1 K 2012-02-15 - 19:33 JimSkon Chapter 5 Quiz
Pptxpptx Chapt6Quiz.pptx manage 216.9 K 2012-03-14 - 14:59 JimSkon  
Pptxpptx Chapt7Quiz.pptx manage 182.1 K 2012-03-14 - 15:00 JimSkon  
Pptxpptx Chapt8Quiz.pptx manage 181.4 K 2012-03-14 - 15:00 JimSkon  
Pdfpdf Cheat-Sheet.pdf manage 38.4 K 2012-04-25 - 14:45 JimSkon Metasploit Cheat Sheet
Docdoc CompSecSyllabus2012.doc manage 31.8 K 2012-02-02 - 18:01 JimSkon Syllabus
Pdfpdf Corporate_Information_Security_Policy_-_Firewall_Traffic.pdf manage 148.8 K 2012-03-05 - 19:27 JimSkon Corporate Information Security Policy - Firewall Traffic
Pptppt Encryption.ppt manage 2268.0 K 2012-02-08 - 17:50 JimSkon Cryptography
Docdoc EthicalHackingGuide.doc manage 431.5 K 2012-02-26 - 15:36 JimSkon Ethical Hacking Guide
Pptppt IntroToSecurity.ppt manage 3155.5 K 2012-02-06 - 15:30 JimSkon Introduction
Topic revision: r77 - 2014-01-15 - JimSkon
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback