ITSec Weekly Plans

Updated 

IT-Security (Information Technology and Security)
4. Semester: Datamatician Course (Computer Science)
 

This is a preliminary schedule: be prepared for changes !
CHECK ALWAYS THE RESPECTIVE WEEK

 

Week

Subjects

Litterature
Recommendations/Links

Exercises/Solutions/Examples

5

Getting ready 
Zealand, Roskilde

 

 

Doonesbury 1-2
Superman
, Hitman...

 

Kurose&Ross: Computer Networks (CN)

 

Stallings: Network Security Essentials (NSE)

 

Easttom: Computer Security Fundamentals (CSF) Extensive background readings

Buying Books  NOW
Winterbathing in the fjord

 

Link to Exercises Kurose&Ross (CN)

Link to Stallings exercises

Download All Slides Kurose&Ross

Introduction to Wireshark (video)

 

IT-Security super job opportunities

(video)

 

 

6

 

 

Security overview

Symmetric keys
Cipher block modes

ECB vs CBC

 

(Public/private keys)


Install necessary SW

Ubuntu Installation
Virtual machines

 

 

 


Literature/recommendations/Link

Slides/Videos

 

Homework1: Security Attacks

Homework1: Security Attacks.html

 

Packet Sniffer Wireshark

Packet Sniffer Wireshark.htm


Lab Cryptool 1
Lab DES file

 

Homework1: Security Attacks Answers
from students

7
more links next row

Public key encryption
RSA & Diffie-Helmann

 

 

Hashing
SHA 512
MAC/HMAC


Renew Certificates

Work on SSL-Assignment

 

 

 

Literature/recommendations/Link

Slides/videos

 

Lab Cryptool 2

 

OpenSSL

Lab Open SSL

 

Lab Cryptool Ceritficates 3

 

Homework 4: Tracking

 

CertificateX509

CertificateX509 No.2
Scripts for X.509 certificates

 

SSL AssignmentC#

TCPEchoServerClientC#

SSLSolutionC#

SSLSolutionClientServerValidationC

 

SSL AssignmentJava

SSLProject
TCPEchoServerClientJava
SSL SolutionJava

 

7
continued

X509 authentification

Procedures & ceritficates

 


SSL/TLS principles
SSL programming

 

 

 

Literature/recommendations/Link

Slides/videos rehearsal on TLS/SSL

 
8

X509 authentification

Procedures & ceritficates

 


SSL/TLS principles
SSL programming

 

 

 

Literature/recommendations/Link

Slides/videos rehearsal on TLS/SSL

 
8

Introduction to password cracking.

Exercises
Password Cracking Mini

 

Literature/recommendations/Links

Slides/videos

PasswordCrackingMiniAssignment

PasswordCrackingProject

PasswordCrackingCentralizedC

PasswordCrackingCentralizedJava

SocketConcurrentJava

8

Kerberos
Ticket Granting Service
Tickets content

Follow up on exercises.

 

 

Literature/recommendations/Links

Slides/videos

Homework 2 Kerberos

Exercises from week 7
to be continued and finalized

 

9

Password Management

HashCat with GPU

Web security
Web Tokens

Follow up on exercises.
Homework 2 Kerberos

 

Literature/recommendations/Links

Slides/videos

Hashcat cracking
Hashcat Cracking.html

JWTRestService

JWT TokenIntroduction

JWTAuthServerClient

 


10

Hacking
Database security
SQL-Attacks
Defence of SQL-injection

Web security


Literature/recommendations/Links

Slides/Videos

Exercises from week 9
to be finalized

SQLInjection Smart

SQLInjection Defence

 

JWTAuthServerClient

 

 

 

10

Pretty Good Privacy
PGP
(S/Mime)

 

Literature/recommendations/Links

Slides/videos

 

Lab PGP-Email

PGP Problems solved

11

VPN
Virtual Private Network
IP-Sec

 

Installation of

VM VirtualBox
Ubuntu 16.04
Kali Linux

Maybe BlockChain
see next row

 

 

Literature/recommendations/Links

NSE Ch. 9 very detailed.
CN: Ch. 8.7 good overview

Slides/Videos

Mandatory VPN project

 

Guidelines on installation of VirtualBox, Ubuntu, Kali & VPN

 

Alternatively choose

Mandatory Blockchain project Word

Mandatory Blockchain project PDF


Useful tips and links for blockchain

 

11/12

Online

Blockchain
E-Coins

Introduction on Mandatory VPN or
Blockchain

Mandatory project starts

 

Slides/Videos

Mandatory VPN project

 

Guidelines on installation of VirtualBox, Ubuntu, Kali & VPN

 

Alternatively choose
Mandatory Blockchain project Word

 

Mandatory Blockchain project PDF

Useful tips and links for blockchain

 

Blockchain questions

12

Mandatory project
Blockchain or VPN

 

Mandatory VPN project extra links

(VPN 14.04 Old version Problems Answered)

VPN 16.04/18.04 Problems Answered

13

Mandatory project
Blockchain or VPN
   

14
OnLine

Hack or get hacked

Homeworks 4+5

ManInTheMiddle-Attacks
ARP Cache Poisoning, DNS Spoofing
ARP Cache Poisoning, SSL Hijacking

 

 

Literature/recommendations/Links

CN: Ch. 6.1, 6.4

Wikipedia: MAC_address

Slides/Videos

Homework 5 Wireshark SSL

 

ManInMiddle Attack Excercise

ManInMiddle Attack Excercise PDF

 

Removed Cain and Abel zip with exe files

 

Cain and Abel zip with txtcnnheat files

John the Ripper Cracker

Challenge from US Difficult!

 

N/A: Firewalls

15

Easter Vacation

  Holidays That means students catch up

  Teachers relax !

16
OnLine

Hack or get hacked

Kali-Linux tool

 


Literature/recommendations/Links

Slides/Videos

Kali-Linux Tools Exercise
Kali-Linux Tools Exercise PDF

nmap.txt

17
OnLine

Hack or get hacked

Kali-Linux tool

Metasploit

Metasploitable

 

 

Literature/recommendations/Links

Slides/Videos

Metasploit Investigation

Metasploitable Installation

Pentest using Metasploitable vs. 1.0

18

Synopsis writing and supervision starts on Wednesday

Synopsis tips and tricks  
19
Synopsis writing

Here are some ideas:

Firewalls theory/practise
Various risks/denfences
Security on mobiles
Gaming over net, vulnerabilities
Cloud security
Log transcripts exercise
Windows vulnerabilities
Hacking theory and practise
Security in layers
Wireless keyboards hacking
E-coins theory and simple practice
Ethereum vs, Lisk tools
Kerberos ideas in Angular
Private blockchains
Web-token and Angular
Your own blockchain
Attaxks on Windows 7 in Metasploit
Machine Learning: Tools investigations and Interpolation
Machine Learning: Tools and Face Recognition





 

 

20

Synopsis writing Synopsis tips and tricks  

21

Synopsis writing Synopsis tips and tricks  

22

Synopsis writing Synopsis tips and tricks  

50

Synopsis writing    

51

Synopsis writing    

52

     
EXTRA

 

Pretty Good Privacy (PGP)
(S/Mime)

 

Literature/recommendations/Links

Slides/videos

 

Lab PGP-Email

PGP Problems solved

EXTRA

Hacking and defence


http://www.hackingtutorials.org/wifi-hacking-tutorials/top-10-wifi-hacking-tools-in-kali-linux/

http://www.kalitutorials.net/


http://www.kalitutorials.net/2013/08/kali-linux.html

http://tools.kali.org/

http://www.techrepublic.com/article/pro-tip-install-kali-linux-tools-on-ubuntu-with-this-easy-script/

 

 

 

 


nmap.txt

Kali-Tools

 


EXTRA

Database transactions
Concurrency by locks

Literature/recommendations/Links

Slides/Videos

Firewalls

DB Chapter19 Assignments
DB Comparison

 

 

Fireewalls Solution
Comparison of Firewalls

DB Chapter 19

DB Comparison Solution

 

     

SecureSocket C#

SecureSocket Java

 

Network-tools

Shields up for ports

23

Rehearsal for exam

 

 

24

Oral Exam

Good luck !

 


Exam Roll List

Re-exam unkbnown

35

 5th Semester starts

 

 

 


 
 

Maintenance by micl@easj.dk