Network Security Fundamentals Security Training Course Dr. Charles - - PowerPoint PPT Presentation

network security fundamentals
SMART_READER_LITE
LIVE PREVIEW

Network Security Fundamentals Security Training Course Dr. Charles - - PowerPoint PPT Presentation

Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Introduction Introduction Welcome to the course! Instructor: Dr. Charles J. Antonelli


slide-1
SLIDE 1

Network Security Fundamentals

Security Training Course

  • Dr. Charles J. Antonelli

The University of Michigan 2013

slide-2
SLIDE 2

Network Security Fundamentals

Introduction

slide-3
SLIDE 3

Introduction

  • Welcome to the course!
  • Instructor:
  • Dr. Charles J. Antonelli

LSA Information Technology 500 S State Ste 1112 cja@umich.edu, 734 763 0607

04/13 cja 2013 3

slide-4
SLIDE 4

Logistics

  • Class
  • 6:00 – 9:00 PM (connect starting at 5:30)
  • April 15, 18, 22, 25 and 29, 2013
  • Breaks
  • About once an hour (idea: get up, move around)
  • Instruction
  • AT&T Connect remote experience

 Please use the feedback icons

  • Lecture, Demonstration, Experiments

02/13 cja 2013 4

slide-5
SLIDE 5

Logistics

  • Labs
  • Linux CentOS 6 lab environment via VMware Player
  • Listserv
  • netsec2013@umich.edu

02/13 cja 2013 5

slide-6
SLIDE 6

Prerequisites

  • Required
  • Understanding of basic Linux fundamentals
  • Understanding of basic internetworking

fundamentals

  • Nice to have
  • Familiarity with Linux architecture & tools
  • Familiarity with popular network tools
  • Some system administration experience
  • Understanding of core IP protocols
  • Familiarity with white- and black-hat tools
  • Open source mindset

6 04/13 cja 2013

slide-7
SLIDE 7

Course Modules

Module Title AA Installation 00 Course Introduction 01 Fundamental Tools 02 Network Fundamentals 03 Network Protocol Attacks 04 Password Strength & Cracking 05 Viruses, Worms, Payloads 06 Firewalls & VPNs 07 Intrusion Detection 08 Scanning 09 Linux Security & Logging 10 Web Security: A Reconnaissance Tool 7 04/13 cja 2013

slide-8
SLIDE 8

Take-Aways

  • Monitor networks and systems using a variety
  • f tools
  • Configure intrusion detectors, scanners, and

firewalls

  • Understand attacks on protocols and

associated countermeasures

  • Determine the existence of weak passwords
  • Set up a basic logging scheme
  • A healthy paranoia

8 04/13 cja 2013

slide-9
SLIDE 9

Meet the instructor

  • High-performance computing, security, and networking
  • Systems research & development
  • Large-scale real-time parallel data acquisition & assimilation
  • Be Aware You’re Uploading
  • Advanced packet vault
  • SeRIF secure remote invocation framework
  • Teaching
  • HPC 101, 201 Basic & Advanced Cluster Computing
  • Linux Platform Security, Hands-on Network Security, Introduction to

SELinux

  • ITS 101 Theory and Practice of Campus Computer Security
  • SI 630 Security in the Digital World, SI 572 Database Applications

Programming

  • EECS 280 C++ Programming, 482 Operating Systems, 489 Computer

Networks; ENGR 101 Programming and Algorithms 02/13 cja 2013 9

slide-10
SLIDE 10

Meet the class

  • Unit
  • Role
  • Windows/Mac OS X/Linux/other
  • Biggest network security issue

10 04/13 cja 2013