ITSec Weekly Plans

Updated 

IT-Security (Information Technology and Security)
4. Semester: Datamatician Course (Computer Science)
 

This is a preliminary schedule: be prepared for changes !
CHECK ALWAYS THE RESPECTIVE WEEK

 

Week

Subjects

Litterature
Recommendations/Links

Exercises/Solutions/Examples

34

Getting ready 
Zealand, Roskilde

 

 

Doonesbury 1-2
Superman
, Hitman...

 

Kurose&Ross: Computer Networks (CN)

 

Stallings: Network Security Essentials (NSE)

 

Easttom: Computer Security Fundamentals (CSF) Extensive background readings

Buying Books  NOW
Winterbathing in the fjord

 

Link to Exercises Kurose&Ross (CN)

Link to Stallings exercises

Download All Slides Kurose&Ross

Introduction to Wireshark (video)

 

IT-Security super job opportunities

(video)

 

 

35

 

 

Security overview

Symmetric keys
Cipher block modes

ECB vs CBC

 

(Public/private keys)


Install necessary SW

Ubuntu Installation
Virtual machines

 

 

 


Literature/recommendations/Link

Slides/Videos

 

Homework1: Security Attacks

Homework1: Security Attacks.html

 

Packet Sniffer Wireshark

Packet Sniffer Wireshark.htm


Lab Cryptool 1
Lab DES file

 

Homework1: Security Attacks Answers
from students

36
more links next row

Public key encryption
RSA & Diffie-Helmann

 

 

Hashing
SHA 512
MAC/HMAC


Renew Certificates

Work on SSL-Assignment

 

 

 

Literature/recommendations/Link

Slides/videos

 

Lab Cryptool 2

 

OpenSSL

Lab Open SSL

 

Lab Cryptool Ceritficates 3

 

Homework 4: Tracking

 

CertificateX509

CertificateX509 No.2
Scripts for X.509 certificates

 

SSL AssignmentC#

TCPEchoServerClientC#

SSLSolutionC#

SSLSolutionClientServerValidationC

 

SSL AssignmentJava

SSLProject
TCPEchoServerClientJava
SSL SolutionJava

 

36
continued

X509 authentification

Procedures & ceritficates

 


SSL/TLS principles
SSL programming

 

 

 

Literature/recommendations/Link

Slides/videos rehearsal on TLS/SSL

 
37

Introduction to password cracking.

Password Management
Password cracking
HashCat

Web security
Web Tokens

Password Cracking Mini

 

Literature/recommendations/Links

Slides/videos

PasswordCrackingMiniAssignment

PasswordCrackingProject

PasswordCrackingCentralizedC

PasswordCrackingCentralizedJava
SocketConcurrentJava

Hashcat cracking
Hashcat Cracking.html

JWTRestService

JWT TokenIntroduction

JWTAuthServerClient

 

 


38

 

Kerberos
Ticket Granting Service
Tickets content

Follow up on exercises.
Web Tokens
HashCat

 

 

Literature/recommendations/Links

Slides/videos

Homework 2 Kerberos

Exercises from week 37
to be continued and finalized

Hashcat cracking
Hashcat Cracking.html

JWTRestService

JWT TokenIntroduction

JWTAuthServerClient

39

Hacking
Database security
SQL-Attacks
Defence of SQL-injection

Web security

Follow up on exercises.
Homework 2 Kerberos

Literature/recommendations/Links

Slides/Videos

Exercises from week 38
to be continued and finalized

Homework 2 Kerberos

 

SQLInjection Smart

SQLInjection Defence

 

JWTAuthServerClient

 

 

 

40

 

VPN Virtual Private
IP-Sec

Introduction on Mandatory VPN project

 

 

Literature/recommendations/Links

NSE Ch. 9.
(CN: Ch. 8.7-8)

Slides/Videos

Mandatory VPN project

 

Useful tips and links for virtual machines & VPN

 

Alternatively choose
Mandatory Blockchain project


Useful tips and links for blockchain

 

40/41

Blockchain
E-Coins

Introduction on Mandatory Blockchain project

Mandatory project
Blockchain or VPN

Slides/Videos

Mandatory VPN project

 

Useful tips and links for virtual machines & VPN

 

Alternatively choose
Mandatory Blockchain project


Useful tips and links for blockchain

42

Autumn Vacation

  Holidays That means students catch up

  Teachers relax !

43

Mandatory project
Blockchain or VPN

 

Mandatory VPN project extra links


 

 

 

VPN 14/16.04 Problems Answered

VPN 16.04/18.04 Problems Answered

44

Hack or get hacked

Homeworks 4+5

ManInTheMiddle-Attacks
ARP Cache Poisoning, DNS Spoofing
ARP Cache Poisoning, SSL Hijacking

 

 

Literature/recommendations/Links

CN: Ch. 6.1, 6.4

Wikipedia: MAC_address

Slides/Videos

Homework 5 Wireshark SSL

 

ManInMiddle Attack Excercise

ManInMiddle Attack Excercise html

 

Removed Cain and Abel zip with exe files

 

Cain and Abel zip with txtcnnheat files

John the Ripper Cracker

Challenge from US Difficult!

 

Firewalls

 

 

45

Hack or get hacked

Kali-Linux tool

Parrot tool


Literature/recommendations/Links

 

 

 

 


nmap.txt

Kali-Linux Tools
Kali-Linux Tools html

 


46 More Kali Linux
Metasploit project
  Hand in project next week 47

47

Synopsis writing and supervision starts on Wednesday

Synopsis tips and tricks  
19
Synopsis writing

Here are some ideas:

Firewalls theory/practise
Various risks/denfences
Security on mobiles
Gaming over net, vulnerabilities
Cloud security
Log transcripts exercise
Windows vulnerabilities
Hacking theory and practise
Security in layers
Wireless keyboards hacking
E-coins theory and simple practice
Ethereum vs, Lisk tools
Kerberos ideas in Angular
Private blockchains
Web-token and Angular
Your own blockchain
Attaxks on Windows 7 in Metasploit
Machine Learning: Tools investigations and Interpolation
Machine Learning: Tools and Face Recognition





 

 

20

Synopsis writing Synopsis tips and tricks  

21

Synopsis writing Synopsis tips and tricks  

22

Synopsis writing Synopsis tips and tricks  

50

Synopsis writing    

51

Synopsis writing    

52

     
EXTRA

 

Pretty Good Privacy (PGP)
(S/Mime)

 

Literature/recommendations/Links

Slides/videos

 

Lab PGP-Email

PGP Problems solved

EXTRA

Hacking and defence


http://www.hackingtutorials.org/wifi-hacking-tutorials/top-10-wifi-hacking-tools-in-kali-linux/

http://www.kalitutorials.net/


http://www.kalitutorials.net/2013/08/kali-linux.html

http://tools.kali.org/

http://www.techrepublic.com/article/pro-tip-install-kali-linux-tools-on-ubuntu-with-this-easy-script/

 

 

 

 


nmap.txt

Kali-Tools

 


EXTRA

Database transactions
Concurrency by locks

Literature/recommendations/Links

Slides/Videos

Firewalls

DB Chapter19 Assignments
DB Comparison

 

 

Fireewalls Solution
Comparison of Firewalls

DB Chapter 19

DB Comparison Solution

 

     

SecureSocket C#

SecureSocket Java

 

Network-tools

Shields up for ports

23

Rehearsal for exam

 

 

24

Oral Exam

Good luck !

 


Exam Roll List

Re-exam unkbnown

35

 5th Semester starts

 

 

 


 
 

Maintenance by micl@easj.dk