1798
Comment:
|
2007
|
Deletions are marked like this. | Additions are marked like this. |
Line 6: | Line 6: |
This page contains general information about security. For your specific class check the list below: * Cptr427Winter2010 |
|
Line 7: | Line 12: |
Line 15: | Line 22: |
* [[http://www.securitywizardry.com/radar.htm|A nice dashboard]] | |
Line 22: | Line 30: |
* [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free) * Hacking Exposed 6th Ed. ISBN:978-0-07-161374-3 |
* [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf | Snort Manual]] (Free) * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3 |
Line 33: | Line 41: |
* Labs will be given from handouts and rely on internet and suggested resources. Topics will be divided between * |
* Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]] |
Line 39: | Line 46: |
'''Recommended Books''' | '''Recommended Book(s)''' |
Line 42: | Line 49: |
Line 43: | Line 51: |
* IpSec |
CPTR 427 Network Security Class Wiki
This page contains general information about security. For your specific class check the list below:
Before you get too involved with looking at what we plan to do this semester, you need to look at what you should already know. Take a look at NetworkSecurity/Prerequisites.
Below is a list of areas we will look at in NetworkSecurity
In the past we have used Web scarab
Books Used in this Class
Required Books
Snort Manual (Free)
- Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
- Each student will be responsible for presenting a chapter from this book.
- Each student will be responsible for demonstrating an attack related to the chapter they present.
- The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
- Each student must read this New York Times Best Seller.
- Cryptography will be studied in conjunction with the assigned chapters.
- Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
- The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
- Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
- Dr. A will do all the lecturing on these topics.
Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from NetworkSecurity/Lab
Recommended Book(s)
- Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7