network security fundamentals
play

Network Security Fundamentals Security Training Course Dr. Charles - PowerPoint PPT Presentation

Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Introduction Introduction Welcome to the course! Instructor: Dr. Charles J. Antonelli


  1. Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013

  2. Network Security Fundamentals Introduction

  3. Introduction • Welcome to the course! • Instructor:  Dr. Charles J. Antonelli LSA Information Technology 500 S State Ste 1112 cja@umich.edu, 734 763 0607 04/13 cja 2013 3

  4. Logistics • Class  6:00 – 9:00 PM (connect starting at 5:30)  April 15, 18, 22, 25 and 29, 2013 • Breaks  About once an hour (idea: get up, move around) • Instruction  AT&T Connect remote experience  Please use the feedback icons  Lecture, Demonstration, Experiments 02/13 cja 2013 4

  5. Logistics • Labs  Linux CentOS 6 lab environment via VMware Player • Listserv  netsec2013@umich.edu 02/13 cja 2013 5

  6. Prerequisites • Required  Understanding of basic Linux fundamentals  Understanding of basic internetworking fundamentals • Nice to have  Familiarity with Linux architecture & tools  Familiarity with popular network tools  Some system administration experience  Understanding of core IP protocols  Familiarity with white- and black-hat tools  Open source mindset 04/13 cja 2013 6

  7. Course Modules Module Title AA Installation 00 Course Introduction 01 Fundamental Tools 02 Network Fundamentals 03 Network Protocol Attacks 04 Password Strength & Cracking 05 Viruses, Worms, Payloads 06 Firewalls & VPNs 07 Intrusion Detection 08 Scanning 09 Linux Security & Logging 10 Web Security: A Reconnaissance Tool 04/13 cja 2013 7

  8. Take-Aways • Monitor networks and systems using a variety of tools • Configure intrusion detectors, scanners, and firewalls • Understand attacks on protocols and associated countermeasures • Determine the existence of weak passwords • Set up a basic logging scheme • A healthy paranoia 04/13 cja 2013 8

  9. Meet the instructor • High-performance computing, security, and networking • Systems research & development  Large-scale real-time parallel data acquisition & assimilation  Be Aware You’re Uploading  Advanced packet vault  SeRIF secure remote invocation framework • Teaching  HPC 101, 201 Basic & Advanced Cluster Computing  Linux Platform Security, Hands-on Network Security, Introduction to SELinux  ITS 101 Theory and Practice of Campus Computer Security  SI 630 Security in the Digital World, SI 572 Database Applications Programming  EECS 280 C++ Programming, 482 Operating Systems, 489 Computer Networks; ENGR 101 Programming and Algorithms 02/13 cja 2013 9

  10. Meet the class • Unit • Role • Windows/Mac OS X/Linux/other • Biggest network security issue 04/13 cja 2013 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend