Hands-On Network Security: Practical Tools & Methods Security - - PowerPoint PPT Presentation

hands on network security practical tools methods
SMART_READER_LITE
LIVE PREVIEW

Hands-On Network Security: Practical Tools & Methods Security - - PowerPoint PPT Presentation

Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Introduction Introduction Welcome to the course! Instructor: Dr.


slide-1
SLIDE 1

Hands-On Network Security: Practical Tools & Methods

Security Training Course

  • Dr. Charles J. Antonelli

The University of Michigan 2012

slide-2
SLIDE 2

Hands-On Network Security

Introduction

slide-3
SLIDE 3

Introduction

  • Welcome to the course!
  • Instructor:
  • Dr. Charles J. Antonelli

LSA Information Technology 500 S State Ste 1112 cja@umich.edu, 734 763 0607

04/12 cja 2012 3

slide-4
SLIDE 4

Logistics

  • Class times
  • Wednesday 8:30-noon and 1-5
  • Thursday 8:30-noon and 1-5
  • Breaks
  • About once an hour
  • Ann Arbor logistics

 Coffee, bathrooms outside  Doors locked 7-7

4 04/12 cja 2012

slide-5
SLIDE 5

Course Format

  • Formal class instruction
  • Lecture
  • Demonstration
  • Experiments
  • Lab environment
  • Linux lab environment via VMware Player
  • Wireless Internet access
  • Server in Ann Arbor

 pst.merit.edu

5 04/12 cja 2012

slide-6
SLIDE 6

Prerequisites

  • Required
  • Understanding of basic Linux fundamentals
  • Understanding of basic internetworking

fundamentals

  • Nice to have
  • Familiarity with Linux architecture & tools
  • Familiarity with popular network tools
  • Some system administration experience
  • Understanding of core IP protocols
  • Familiarity with white- and black-hat tools
  • Open source mindset

6 04/12 cja 2012

slide-7
SLIDE 7

Course Modules

Module Title AA Installation 00 Course Introduction 01 Fundamental Tools 02 Network Fundamentals 03 Network Protocol Attacks 04 Password Strength & Cracking 05 Viruses, Worms, Payloads 06 Firewalls & VPNs 07 Intrusion Detection 08 Scanning 09 Linux Security & Logging 10 Web Security: A Reconnaissance Tool 7 04/12 cja 2012

slide-8
SLIDE 8

Take-Aways

  • Monitor networks and systems using a variety
  • f tools
  • Configure intrusion detectors, scanners, and

firewalls

  • Understand attacks on protocols and

associated countermeasures

  • Determine the existence of weak passwords
  • Set up a basic logging scheme
  • A healthy paranoia

8 04/12 cja 2012

slide-9
SLIDE 9

Meet the instructor

  • R&D(&S) in cyberinfrastructure, security, and networking
  • Systems research & development
  • Large-scale real-time parallel data acquisition & assimilation
  • Be Aware You’re Uploading
  • Advanced packet vault
  • SeRIF secure remote invocation framework
  • Teaching
  • HPC 101, 201 Basic & Advanced Cluster Computing
  • Linux Platform Security, Hands-on Network Security, Introduction to

SELinux

  • ITS 101 Theory and Practice of Campus Computer Security
  • SI 630 Security in the Digital World, SI 572 Database Applications

Programming

  • EECS 280 C++ Programming, 482 Operating Systems, 489 Computer

Networks; ENGR 101 Programming and Algorithms 04/12 cja 2012 9

slide-10
SLIDE 10

Meet the class

  • Unit
  • Role
  • Windows/Mac OS X/Linux/other
  • Biggest network security issue

10 04/12 cja 2012