'There's No Perfect System'
Welcome to ITT320 Computer Security.Please find the course scheme of work for semester Dec 2012 - Apr 2013 <SCHEME OF WORK>
----------------------------------------------------------------------------------------------------
Announcement
1) Please advice our replacement class (to replace the 31 December 2012 class)Task 2 Jan 2013
1) Please prepare your own mind map for Chapter 4 - Firewall Application
as most of us will find this chapter need to memorize.
2) Please complete the Lab 1 exercise and submit to my room before
the next class.
3) Please discuss and advice me our replacement class date.
4) Quiz 1 will be on next week. Good Luck.
** Today, all lecturer have to attend our Academic Meeting from 2.30pm - 5pm
2) Lab for 6 March 2013 will be conducted on 28 February 2013. There will be no lab on 6 March 2013.
3) Lecture class on 4 March 2013 will be postponed to other date. REPLACED ON 28/2/2013. DONE!
----------------------------------------------------------------------------------------------------
Class Materials
Early preparation for your class is much better. Google for additional information. Think technically.Download our second textbook : Second Textbook (eBook)
Notes
4) Chapter 4 - Firewall Practical Applications
5) Chapter 5 - Intrusion Detection System || Additional - IDS using SAX and Wireshark
6) Chapter 6 - Encryption
7) Chapter 7 - Virtual Private Network || additional || Microsoft VPN
8) Chapter 8 - OS Hardening
9) Chapter 9 - Defending Against Virus Attack
10) Chapter 10 - Defending Againts Trojan Horse, Spyware and Adware
11) Chapter 11 - Spoofing Attack
12) Chapter 12 - Server Hole
13) Chapter 13 - Client Hole
14) Chapter 14 - Trojan Horse / Virus
15) Chapter 15 - Reporting Security Problems
----------------------------------------------------------------------------------------------------5) Chapter 5 - Intrusion Detection System || Additional - IDS using SAX and Wireshark
6) Chapter 6 - Encryption
7) Chapter 7 - Virtual Private Network || additional || Microsoft VPN
8) Chapter 8 - OS Hardening
9) Chapter 9 - Defending Against Virus Attack
10) Chapter 10 - Defending Againts Trojan Horse, Spyware and Adware
11) Chapter 11 - Spoofing Attack
12) Chapter 12 - Server Hole
13) Chapter 13 - Client Hole
14) Chapter 14 - Trojan Horse / Virus
15) Chapter 15 - Reporting Security Problems
Assignment & Project
1) Assignment 1 - Individual | Due 25 Jan 20132) Group Project - Penetration Testing | Due 13 Mac 2013
----------------------------------------------------------------------------------------------------
Lab / Practical
1) Intro / Basic Network Config | Done2) DoS / DDoS Attack + Firewall Config | Done
3) Info. Gathering : OS / Port Scanning | Done
4) Vulnerability Scanning
5) Intro to Backtrack + Metasploit
6) Network Monitoring : Sniffing Attack & How to defend
7) Wireless Security : Hacking WEP / P1
8) Web Security : SQL Injection
9) Network Design Simulation
10) Hacking Test
----------------------------------------------------------------------------------------------------
QUIZ & TEST
Quiz 1 : 28/1/2012 | Chapter 1-5 | DoneQuiz 2 : 20/2/2013 | Chapter 6-10 | Online Quiz at i-Learn
Quiz 3 : 6/3/2013 | Chapter 12-14 | Online Quiz at i-Learn available for 1 day but quiz duration is 1 Hour.
Test 1 : 22/02/2013 | Chapter 1-6 | 8PM-10PM
Test 2 : 20/03/2013 | Chapter 7 - 14 | During Class
----------------------------------------------------------------------------------------------------
REPLACEMENT CLASS
1) Our replacement class will be conducted via i-learn portal on 22 Feb 2013. Please read the announcement in the portal. Class discussion will be started at 10-12PM. Please ensure you login on the portal during the date and time.----------------------------------------------------------------------------------------------------
Comments
Post a Comment