network security fundamentals
play

Network Security Fundamentals Security Training Course Dr. Charles - PowerPoint PPT Presentation

Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Introduction Introduction Welcome to the course! Instructor: Dr. Charles J. Antonelli


  1. Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013

  2. Network Security Fundamentals Introduction

  3. Introduction • Welcome to the course! • Instructor:  Dr. Charles J. Antonelli LSA Information Technology 500 S State Ste 1112 cja@umich.edu, 734 763 0607 04/13 cja 2013 3

  4. Logistics • Class  6:00 – 9:00 PM (connect starting at 5:30)  April 15, 18, 22, 25 and 29, 2013 • Breaks  About once an hour (idea: get up, move around) • Instruction  AT&T Connect remote experience  Please use the feedback icons  Lecture, Demonstration, Experiments 02/13 cja 2013 4

  5. Logistics • Labs  Linux CentOS 6 lab environment via VMware Player • Listserv  netsec2013@umich.edu 02/13 cja 2013 5

  6. Prerequisites • Required  Understanding of basic Linux fundamentals  Understanding of basic internetworking fundamentals • Nice to have  Familiarity with Linux architecture & tools  Familiarity with popular network tools  Some system administration experience  Understanding of core IP protocols  Familiarity with white- and black-hat tools  Open source mindset 04/13 cja 2013 6

  7. Course Modules Module Title AA Installation 00 Course Introduction 01 Fundamental Tools 02 Network Fundamentals 03 Network Protocol Attacks 04 Password Strength & Cracking 05 Viruses, Worms, Payloads 06 Firewalls & VPNs 07 Intrusion Detection 08 Scanning 09 Linux Security & Logging 10 Web Security: A Reconnaissance Tool 04/13 cja 2013 7

  8. Take-Aways • Monitor networks and systems using a variety of tools • Configure intrusion detectors, scanners, and firewalls • Understand attacks on protocols and associated countermeasures • Determine the existence of weak passwords • Set up a basic logging scheme • A healthy paranoia 04/13 cja 2013 8

  9. Meet the instructor • High-performance computing, security, and networking • Systems research & development  Large-scale real-time parallel data acquisition & assimilation  Be Aware You’re Uploading  Advanced packet vault  SeRIF secure remote invocation framework • Teaching  HPC 101, 201 Basic & Advanced Cluster Computing  Linux Platform Security, Hands-on Network Security, Introduction to SELinux  ITS 101 Theory and Practice of Campus Computer Security  SI 630 Security in the Digital World, SI 572 Database Applications Programming  EECS 280 C++ Programming, 482 Operating Systems, 489 Computer Networks; ENGR 101 Programming and Algorithms 02/13 cja 2013 9

  10. Meet the class • Unit • Role • Windows/Mac OS X/Linux/other • Biggest network security issue 04/13 cja 2013 10

Recommend


More recommend