hands on network security practical tools methods
play

Hands-On Network Security: Practical Tools & Methods Security - PowerPoint PPT Presentation

Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Introduction Introduction Welcome to the course! Instructor: Dr.


  1. Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012

  2. Hands-On Network Security Introduction

  3. Introduction • Welcome to the course! • Instructor:  Dr. Charles J. Antonelli LSA Information Technology 500 S State Ste 1112 cja@umich.edu, 734 763 0607 04/12 cja 2012 3

  4. Logistics • Class times  Wednesday 8:30-noon and 1-5  Thursday 8:30-noon and 1-5 • Breaks  About once an hour  Ann Arbor logistics  Coffee, bathrooms outside  Doors locked 7-7 04/12 cja 2012 4

  5. Course Format • Formal class instruction  Lecture  Demonstration  Experiments • Lab environment  Linux lab environment via VMware Player  Wireless Internet access  Server in Ann Arbor  pst.merit.edu 04/12 cja 2012 5

  6. Prerequisites • Required  Understanding of basic Linux fundamentals  Understanding of basic internetworking fundamentals • Nice to have  Familiarity with Linux architecture & tools  Familiarity with popular network tools  Some system administration experience  Understanding of core IP protocols  Familiarity with white- and black-hat tools  Open source mindset 04/12 cja 2012 6

  7. Course Modules Module Title AA Installation 00 Course Introduction 01 Fundamental Tools 02 Network Fundamentals 03 Network Protocol Attacks 04 Password Strength & Cracking 05 Viruses, Worms, Payloads 06 Firewalls & VPNs 07 Intrusion Detection 08 Scanning 09 Linux Security & Logging 10 Web Security: A Reconnaissance Tool 04/12 cja 2012 7

  8. Take-Aways • Monitor networks and systems using a variety of tools • Configure intrusion detectors, scanners, and firewalls • Understand attacks on protocols and associated countermeasures • Determine the existence of weak passwords • Set up a basic logging scheme • A healthy paranoia 04/12 cja 2012 8

  9. Meet the instructor • R&D(&S) in cyberinfrastructure, security, and networking • Systems research & development  Large-scale real-time parallel data acquisition & assimilation  Be Aware You’re Uploading  Advanced packet vault  SeRIF secure remote invocation framework • Teaching  HPC 101, 201 Basic & Advanced Cluster Computing  Linux Platform Security, Hands-on Network Security, Introduction to SELinux  ITS 101 Theory and Practice of Campus Computer Security  SI 630 Security in the Digital World, SI 572 Database Applications Programming  EECS 280 C++ Programming, 482 Operating Systems, 489 Computer Networks; ENGR 101 Programming and Algorithms 04/12 cja 2012 9

  10. Meet the class • Unit • Role • Windows/Mac OS X/Linux/other • Biggest network security issue 04/12 cja 2012 10

Recommend


More recommend