| 
  
   Size: 1806 
  
  Comment:  
 | 
  
   Size: 2112 
  
  Comment:  
 | 
| Deletions are marked like this. | Additions are marked like this. | 
| Line 6: | Line 6: | 
| This page contains general information about security. For your specific class check the list below: * Cptr427Winter2010  | 
|
| Line 7: | Line 12: | 
| Line 14: | Line 21: | 
|    * [[NetworkSecurity/FireWall]] * [[http://www.backtrack-linux.org/|Backtrack Penetration Testing]]  | 
|
| Line 15: | Line 24: | 
| * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]] | |
| Line 22: | Line 31: | 
|    * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free) * Hacking Exposed 6th Ed. ISBN:978-0-07-161374-3  | 
   * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf | Snort Manual]] (Free) * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3  | 
| Line 38: | Line 47: | 
| '''Recommended Books''' | '''Recommended Book(s)''' | 
| Line 41: | Line 50: | 
| Line 42: | Line 52: | 
* IpSec  | 
CPTR 427 Network Security Class Wiki
This page contains general information about security. For your specific class check the list below:
Before you get too involved with looking at what we plan to do this semester, you need to look at what you should already know. Take a look at NetworkSecurity/Prerequisites.
Below is a list of areas we will look at in NetworkSecurity
In the past we have used Web scarab
Books Used in this Class
Required Books
Snort Manual (Free)
- Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3 
- Each student will be responsible for presenting a chapter from this book.
 - Each student will be responsible for demonstrating an attack related to the chapter they present.
 
 - The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323 
- Each student must read this New York Times Best Seller.
 - Cryptography will be studied in conjunction with the assigned chapters.
 
 - Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4 
- The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
 - Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
 - Dr. A will do all the lecturing on these topics.
 
 Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from NetworkSecurity/Lab
Recommended Book(s)
- Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7
 
