LABS THAT NEED TO BE COMPLETED BY 1/11
Unit 1 - CSAW Challenge
Students will discover the fascinating world of cybersecurity such as log and file analysis, rootkit detection and analysis, botnet detection and analysis, live system forensics, steganography, file carving and more. Your team will battle against other elite teams – and the clock – as they gather clues to solve this fast-paced mystery. The challenge takes place remotely over the Internet. Eight to twelve teams of finalists will be brought to NYC with their faculty mentors to compete in the finals competition and awards ceremony. The cost of the trip is covered by the competition.
CSAW 2012 Challenge
Tools
FreeMat (Free Version of Matlab)
Exif Data Viewer
Offline Windows Password Reset
Evidence (CSAW 2011) and Worksheets
Evidence Sheet CSAW Competition 2011
TestOut 0.1.1 Security Challenges
TestOut 0.1.2 Security Roles and Concepts
TestOut 0.1.3 Threat Agent Types
TestOut 0.1.5 General Attack Strategy
TestOut 0.1.6 General Defense Strategy
Unit 2 - Introduction and Access Control
This unit introduces the course, recommended prerequisites, and basic security terms that will be referenced throughout the course. A review of configuring Active Directory and Group policy to secure a Windows based network is presented. This unit also provides an overview of access control models, increasing security using authentication methods, configuring user accounts and passwords to control and restrict access to network resources, and authorization concepts to control access to resources. Finally, students will learn about controls that can be used to physically protect assets from threats and best practices for controlling access to resources.
Objectives:
Students will be able to:
Configure objects in Active Directory
Control logical access by configuring user account and account lockout policies
Configure day/time restrictions, computer restrictions, and expiration dates for user accounts
Enable and disable user accounts
Configure the password policy for a domain
View system logon activity by using a key logger tool
Using Group Policy Management, configure security settings such as password policy settings to define requirements for user passwords
Using Group Policy Management, configure user right assignments to identify actions users can perform on a system
Create a group and add members to the group
Enable and disable User Account Control (UAC)
Use alternate credentials to run programs that require elevated privileges
Students will know:
Common objects identified within the Active Directory
The difference between role-based access control and rule-based access control
The difference between authentication and identification
Common authentication types
Methods administrators use to control user account and password security
Methods hackers use to discover passwords
Strategies to protect against password attacks
The sequence for deploying physical security
Videos
Server 08 Install
Domain and Activate Directory Setup
Group Policy Setup and Modification
Worksheets
TestOut 0.2.1 Active Directory Introduction
TestOut 0.2.2 Active Directory Structure
TestOut 0.2.3 Viewing Active Directory
TestOut 0.2.5 Group Policy Overview
TestOut 0.2.6 Viewing Group Policy
TestOut 1.1.1 Access Control Models
TestOut 1.1.3 Implementing Discretionary Access Control
TestOut 1.2.3 Using a Biometric Scanner
TestOut 1.2.5 Using Single Sign-on
TestOut 1.3.1 User Accounts and Passwords
TestOut 1.3.3 Configuring User and Password Restrictions
TestOut 1.4.2 Cumulative Access
TestOut 1.4.4 Examining the Access Token TestOut 1.5.1 Physical Security TestOut 1.6.1 Access Control Best Practices
TestOut 1.6.3 Viewing Implicit Deny
Unit 1 Review
Labs
TestOut 0.2.8 Create and Link a GPO
TestOut 1.3.4 Configure User Account Restrictions
TestOut 1.3.5 Configure Account Policies
TestOut 1.4.5 Create a Group
Install Server 08
Setup AD and Join a Domain in VM
Modify GP Lab in VM
Control Policies Lab in VM
Unit 3 - Cryptography
This unit examines the fundamentals of cryptography. Students will become familiar with hashing, symmetric encryption, asymmetric encryption concepts and how they can be combined to take advantage of the strengths of each. Core concepts of Public Key Infrastructure (PKI) will be discussed as well as secure protocols that can be used to provide security services to new or existing protocols.
Objectives:
Students will be able to:
Generate a hash value for a file
Compare hash values to verify message integrity
Analyze the strength of passwords by using a rainbow table to perform a cryptanalysis attack on the hashed values of passwords
Perform a brute force analysis of encrypted data to recover original data
Manage certificates by requesting, approving, and installing certificates
Encrypt a file to secure data using EFS
Protect hard drive contents with BitLocker.
Configure settings to control BitLocker using Group Policy
Modify Web site settings to require SSL
Use SSL from a browser to create a secure connection
Enforce the use of IPSec through Connection Security Rules
Students will know:
Legitimate uses for cryptanalysis
The difference between a transposition cipher and a substitution cipher
Legitimate uses of steganography
Security goals or function of hashes
The difference between the MD-5 and SHA-1 hash
What a collision is and why it is undesirable in a hashing algorithm
How symmetric keys are typically exchanged between communication partner
The advantage and disadvantages of increasing the number of bits in the key
How does 3DES differ from DES
How public keys differ from private keys
The role of the Registration Authority (RA)
Who authorizes subordinate CAs
How to tell that a session with a Web server is using SSL
Videos
Worksheets
TestOut 2.1.1 Cryptography Concepts
TestOut 2.2.1 Hashing
TestOut 2.2.3 Using Hashes
TestOut 2.3.1 Symmetric Encryption
TestOut 2.3.2 HMAC
TestOut 2.3.4 Cracking a Symmetric Encryption
TestOut 2.4.1 Asymmetric Encryption
TestOut 2.5.1 Certificates
TestOut 2.5.2 Managing Certificates
TestOut 2.5.5 CA Implementation
TestOut 2.5.6 Configuring a Subordinate CA
TestOut 2.6.1 Combining Cryptographic Methods
TestOut 2.6.2 Hardware Based Encryption Devices
TestOut 2.6.3 BitLocker and Database Encryption
TestOut 2.6.4 PGP and GPG
TestOut 2.6.8 Configuring Bitlocker
TestOut 2.6.9 Encrypting Files with GPG
TestOut 2.7.1 Secure Protocols
TestOut 2.7.3 Adding SSL to a Web Site
TestOut 2.7.5 IPSec
TestOut 2.7.7 Requiring IPSec for Communications
Labs
TestOut 2.5.3 Manage Certificates
TestOut 2.6.7 Encrypt Files
TestOut 2.7.4 Allow SSL Connections
Worksheets
TestOut 3.2.1 and 3.2.3 Protocols and Ports
Handy Links and Interesting Articles
The First Few Milliseconds of an HTTPS connection
The Internet is Infected 60 Minutes Video
Information Technology Careers Video
List of File Signature Hex Values
Article: Why your cell phone can't get WiFi in a stadium
Article: How I cracked my neighbor's WiFi password
Video: Hackers: Outlaws and Angels
Calendar