ITSec Weekly Plans

Updated 

IT-Security (Information Technology and Security)
4. Semester: Datamatician Course (Computer Science)
 

This is a preliminary schedule: be prepared for changes !
CHECK ALWAYS THE RESPECTIVE WEEK

 

Week

Subjects

Litterature
Recommendations/Links

Exercises/Solutions/Examples

4

Getting ready 
Zealand, Roskilde

 

 

Doonesbury 1-2
Superman
, Hitman...

 

Kurose&Ross: Computer Networks (CN)

 

Stallings: Network Security Essentials (NSE)

 

Easttom: Computer Security Fundamentals (CSF) Extensive background readings

Buying Books  NOW
Winterbathing in the fjord

 

Link to Exercises Kurose&Ross (CN)

Link to Stallings exercises

Download All Slides Kurose&Ross

Introduction to Wireshark (video)

 

IT-Security super job opportunities

(video)

 

 

5

 

 

Security overview

Symmetric keys
Cipher block modes

ECB vs CBC

 

(Public/private keys)


Install necessary SW

 

 


Literature/recommendations/Link

Slides/Videos

 

Homework1: Security Attacks

Homework1: Security Attacks.html

 

Packet Sniffer Wireshark

Packet Sniffer Wireshark.htm


Lab Cryptool 1
Lab DES file

 

Homework1: Security Attacks Answers
from students

6

 

 

Public key encryption
RSA & Diffie-Helmann

 

 

Hashing
SHA 512
MAC/HMAC


Renew Certificates

 

 

 

 

Literature/recommendations/Link

Slides/videos

 

Lab Cryptool 2

 

OpenSSL

Lab Open SSL

 

Lab Cryptool Ceritficates 3

 

Tracking Exercise

 

CertificateX509

CertificateX509 No.2
Scripts for X.509 certificates

 

7

 

Kerberos
Ticket Granting Service
Tickets content

More week 7 next row

 

Literature/recommendations/Links

Slides/videos

Homework 2 Kerberos

Exercises from week 6
to be continued

7

 

 

X509 authentification

Procedures & ceritficates

 


SSL/TLS principles
SSL programming

 

 

 

Literature/recommendations/Link

Slides/videos rehearsal on TLS/SSL

 

SSL AssignmentC#

TCPEchoServerClientC#

SSLSolutionC#

SSLSolutionClientServerValidationC

 

Wireshark SSL

Homework 5 Wireshark SSL

 

SSL AssignmentJava

SSLProject
TCPEchoServerClientJava
SSL SolutionJava

 

8

 

Pretty Good Privacy (PGP)
(S/Mime)

 

Literature/recommendations/Links

Slides/videos

 

Exercises from week 7
to be finalized

Lab PGP-Email

PGP Problems solved

10

Introduction to password cracking.

Password Management
Password cracking
HashCat

Web security
Web Tokens

 

Ubuntu Installation
Virtual machines

 

Literature/recommendations/Links

Slides/videos

PasswordCrackingMiniAssignment

PasswordCrackingProject

PasswordCrackingCentralizedC

PasswordCrackingCentralizedJava
SocketConcurrentJava

Hashcat cracking Hashcat Cracking.html

JWTRestService

JWT TokenIntroduction

JWTAuthServerClient

 

 


11

Follow up on exercises and on password management

Hacking
Database security
SQL-Attacks
Defence of SQL-injection

Web security
Web Tokens

Literature/recommendations/Links

Slides/Videos

SQLInjection Smart

SQLInjection Defence

 

JWTAuthServerClient

 

 

 

12

 

VPN Virtual Private
IP-Sec

Introduction on Mandatory VPN project

 

 

Literature/recommendations/Links

NSE Ch. 9.
(CN: Ch. 8.7-8)

Slides/Videos

Mandatory VPN project

 

Useful tips and links for virtual machines & VPN

 

Alternatively choose
Mandatory Blockchain project


Useful tips and links for blockchain

 

12

Blockchain
E-Coins

Introduction on Mandatory Blockchain project

Slides/Videos

 
13

Mandatory project
Blockchain or VPN

 

Mandatory VPN project extra links


 

 

 

VPN 14/16.04 Problems Answered

VPN 16.04/18.04 Problems Answered

14
Mandatory project
Blockchain or VPN

 

 

15

Hack or get hacked

Homeworks 4+5

ManInTheMiddle-Attacks
ARP Cache Poisoning, DNS Spoofing
ARP Cache Poisoning, SSL Hijacking

Follow up on exercises.

 

Literature/recommendations/Links

CN: Ch. 6.1, 6.4

Wikipedia: MAC_address

Slides/Videos

Homework 5 Wireshark SSL

 

ManInMiddle Attack Excercise

ManInMiddle Attack Excercise html

 

Removed Cain and Abel zip with exe files

 

Cain and Abel zip with txtcnnheat files

John the Ripper Cracker

Challenge from US Difficult!

 

Firewalls

 

 

16

Easter Vacation

  Holidays That means students catch up

 

17

 

Hack or get hacked

Kali-Linux tool

Parrot tool


Literature/recommendations/Links

 

 

 

 


nmap.txt

Kali-Linux Tools
Kali-Linux Tools html

 


18

Synopsis writing and supervision starts on Wednesday

Synopsis tips and tricks  
19
Synopsis writing

Here are some ideas:

Firewalls theory/practise
Various risks/denfences
Security on mobiles
Gaming over net, vulnerabilities
Cloud security
Log transcripts exercise
Windows vulnerabilities
Hacking theory and practise
Security in layers
Wireless keyboards hacking
E-coins theory and simple practice
Ethereum vs, Lisk tools
Kerberos ideas in Angular
Private blockchains
Web-token and Angular
Your own blockchain



 

 

20

Synopsis writing Synopsis tips and tricks  

21

Synopsis writing Synopsis tips and tricks  

22

Synopsis writing Synopsis tips and tricks  

50

Synopsis writing    

51

Synopsis writing    

52

     
EXTRA

Hacking and defence


http://www.hackingtutorials.org/wifi-hacking-tutorials/top-10-wifi-hacking-tools-in-kali-linux/

http://www.kalitutorials.net/


http://www.kalitutorials.net/2013/08/kali-linux.html

http://tools.kali.org/

http://www.techrepublic.com/article/pro-tip-install-kali-linux-tools-on-ubuntu-with-this-easy-script/

 

 

 

 


nmap.txt

Kali-Tools

 


EXTRA

Database transactions
Concurrency by locks

Literature/recommendations/Links

Slides/Videos

Firewalls

DB Chapter19 Assignments
DB Comparison

 

 

Fireewalls Solution
Comparison of Firewalls

DB Chapter 19

DB Comparison Solution

 

     

SecureSocket C#

SecureSocket Java

 

Network-tools

Shields up for ports

23

Rehearsal for exam

 

 

24

Oral Exam

Good luck !

 


Exam Roll List

Re-exam unkbnown

35

 5th Semester starts

 

 

 


 
 

Maintenance by micl@easj.dk