Reference no: EM132177023
How to create a virtual machine and install Linux Mint within the 'VM.' This lecture explains how to install and use VMWare on your host machine. What a COOL thing it is to be able to run multiple operating systems, even multiple NETWORKS on your desktop!
Introduction to computer and network security:
Why it's important, security problems, types of 'attacks,' CIANA.
Risk analysis:
Defining assets in a risk analysis, identifying threats and the likelihood of the threats occurring, identifying the consequences of a threat occurring, and vulnerabilities that increase risk.
Also covers common safeguards to reduce the impact of threats, securing equipment/data, and incident response (should be included in security policy).
Authentication:
Types of authentication, biometrics, detailed explanation of password hashing, examples of bad password choices, password cracking methods, network access controls, and coverage of password security on Unix and Windows systems.
Access control
This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.
Password auditing:
Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.
Project: Password Policies and Auditing
Network Security: Packet Capture Analysis
1. Review of TCP/IP:
TCP/IP fundamentals, the OSI model, TCP vs UDP, application protocols, IP addressing, NAT, and an overview of proxy servers.
2. Network signature analysis:
Signature analysis, brief introduction to the Snort IDS, analysis of ICMP packet capture, common TCP/UDP ports, network baselining, the TCP 3-way handshake, and review of TCP flags.
3. Network signature analysis example:
ARP Spoofing
4. Honeypots
A honeypot is a computer security system used to detect, deflect, or, in some manner, counteract attempts at unauthorized use of an information system or computer. In this video I discuss honeypots and how they are used to defend your network. In particular the technology is useful for identifying and monitoring insider threats, which is the number one threat vector for most networks.
Firewalls
Introduction to Firewalls:
An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy.
In the readings you will learn about DMZs and proxy servers.
Creating a host-only network in VMWare:
Create a network in VMWare for a host-only network (i.e., not connected to the Internet, great for running security and forensics sensitive experiments).
Attachment:- Assignment.rar