beardis317.blogspot.com
IS317 Ethical Hacking and Network Defense: UNIT 9 – Hacking Wireless Networks
http://beardis317.blogspot.com/2008/05/unit-9-hacking-wireless-networks.html
IS317 Ethical Hacking and Network Defense. Instructor: Mr. Beard. Wednesday, February 4, 2009. UNIT 9 – Hacking Wireless Networks. Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006. Chapter 11, pages 269–289 Quiz. Chapter 11, pp. 290–292. Hard Drives Required for LAB. Project Part 1 Submission. Project Part 2 - Use Internet resources to footprint fazzle.com. Assigned Week 9 and Submission Due Week 10. LAB 1: INSTALLING NETSTUMBLER. How did the tools perform?
beardis317.blogspot.com
IS317 Ethical Hacking and Network Defense: UNIT 7 – LINUX OPERATING SYSTEM VULNERABILITIES
http://beardis317.blogspot.com/2008/04/unit-7-linux-operating-system.html
IS317 Ethical Hacking and Network Defense. Instructor: Mr. Beard. Wednesday, January 28, 2009. UNIT 7 – LINUX OPERATING SYSTEM VULNERABILITIES. Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006. Textbook – Chapter 9, pp. 195–227. Chapter 9, pp. 228–230. Hard Drives Required for LAB. LAB 1: LINUX PROGRAMMING. Refer to emailed handout. LAB 2: FINDING LINUX ROOTKITS ON THE INTERNET. 1 What can be the impact of rooting the commands that you listed?
beardis315.blogspot.com
IS315 Risk Management: Unit 3 - Assets
http://beardis315.blogspot.com/2008/10/unit-3-assets.html
Instructor: Mr. Beard. Wednesday, October 1, 2008. Unit 3 - Assets. Panko, Raymond R., Kim, Gregg, M. Bishop, and Todd King, IS Risk Management and Intrusion Detection, Indianapolis: Pearson Learning Solutions, 2006. Chapter 6: Asset Value, Policies, and Roles-Risk Management Risk Management (about 10 pages). ITT Tech Virtual Library Books Books 24x7. CISSP: Certified Information Systems Security Professional Study Guide, Second Edition. Http:/ www.investopedia.com/terms/t/tangibleasset.asp. Submit your ...
beardis316.blogspot.com
IS316 Fundamentals of Network Security, Firewalls, and VPNs: IS316 SYLLABUS: Fundamentals of Network Security, Firewalls, and VPNs
http://beardis316.blogspot.com/2008/03/is316-syllabus-fundamentals-of-network.html
IS316 Fundamentals of Network Security, Firewalls, and VPNs. Instuctor: Mr. Beard. Friday, March 14, 2008. IS316 SYLLABUS: Fundamentals of Network Security, Firewalls, and VPNs. Office hours: During class or via email. Class hours: Class meets on Fridays. Types of firewalls for securing data. Implementation of firewalls and virtual private networks. Standards of NIST publication 800-41 for firewalls. Greg Holden. Guide to Firewalls and Network Security Intrusion Detection and VPNs. Posted by Mr. B. Unit ...
beardis315.blogspot.com
IS315 Risk Management: UNIT 8 – Intrusion Detection: IDS Techniques and Hardening
http://beardis315.blogspot.com/2008/11/unit-8-intrusion-detection-ids.html
Instructor: Mr. Beard. Wednesday, November 5, 2008. UNIT 8 – Intrusion Detection: IDS Techniques and Hardening. Panko, Raymond R., Kim, Gregg, M. Bishop, and Todd King, IS Risk Management and Intrusion Detection, Indianapolis: Pearson Learning Solutions, 2006. 8226; Chapter 9: Intrusion Detection-(about 30 pages). Http:/ www.windowsecurity.com/articles/What You Need to Know About Intrusion Detection Systems.html. Http:/ www.snort.org/docs/idspaper/. Http:/ www.securityfocus.com/infocus/1852. Limitation o...
beardis316.blogspot.com
IS316 Fundamentals of Network Security, Firewalls, and VPNs: Unit 7 - Choosing a Bastion Host
http://beardis316.blogspot.com/2008/01/unit-7-choosing-bastion-host.html
IS316 Fundamentals of Network Security, Firewalls, and VPNs. Instuctor: Mr. Beard. Friday, March 14, 2008. Unit 7 - Choosing a Bastion Host. Guide to Firewalls and Network Security Intrusion Detection and VPNs. Chapter 8, pp. 243–276. 8226; http:/ csrc.nist.gov/publications/nistpubs/800-41/sp800-41.pdf. 8226; ITT Tech Virtual Library Books Tittel Ed, Stewart James Michael and Chapple Mike. CISSP: Certified Information Systems Security Professional Study Guide, Second Edition. Case Assignment 8-1 (CA1) 274.
beardis315.blogspot.com
IS315 Risk Management: November 2008
http://beardis315.blogspot.com/2008_11_01_archive.html
Instructor: Mr. Beard. Wednesday, November 12, 2008. UNIT 9 –IDS and IPS Systems. Panko, Raymond R., Kim, Gregg, M. Bishop, and Todd King, IS Risk Management and Intrusion Detection, Indianapolis: Pearson Learning Solutions, 2006. 8226; Chapter 17: The Future of Intrusion Detection and Prevention (about 9 pages) at ITT Tech Virtual Library Books Books24x7 Intrusion Detection and Prevention. 8226; http:/ www.portknocking.org. 8226; http:/ honeyblog.org/junkyard/paper/Holz-2005-DHO.pdf. Read the article at:.
beardis315.blogspot.com
IS315 Risk Management: October 2008
http://beardis315.blogspot.com/2008_10_01_archive.html
Instructor: Mr. Beard. Wednesday, October 29, 2008. UNIT 7 – Business Continuity and Disaster Recovery. Panko, Raymond R., Kim, Gregg, M. Bishop, and Todd King, IS Risk Management and Intrusion Detection, Indianapolis: Pearson Learning Solutions, 2006. 8226; Chapter 15: Business Continuity Planning-(about 15 pages) at ITT Tech Virtual Library Books Books 24x7 CISSP: Certified Information Systems Security Professional Study Guide, Second Edition. Refer to Handout given out in class. 1 Did the student iden...
beardis316.blogspot.com
IS316 Fundamentals of Network Security, Firewalls, and VPNs: Unit 6 - Encryption and Firewalls
http://beardis316.blogspot.com/2008/01/unit-6-encryption-and-firewalls.html
IS316 Fundamentals of Network Security, Firewalls, and VPNs. Instuctor: Mr. Beard. Friday, March 14, 2008. Unit 6 - Encryption and Firewalls. Textbook: Guide to Firewalls and Network Security Intrusion Detection and VPNs. Chapter 7, pp. 203–242. 8226; http:/ csrc.nist.gov/publications/nistpubs/800-41/sp800-41.pdf. 8226; ITT Tech Virtual Library Books Dunsmore Bradley Mission Critical Internet Security Chapter 3: IPSec. Review Questions 1–19, pp. 231–233 Assignment due in class. Case Assignment 7-2 (CA1).
beardis317.blogspot.com
IS317 Ethical Hacking and Network Defense: IS317 Unit 6 Microsoft Operating System Vulnerabilities
http://beardis317.blogspot.com/2008/04/is317-unit-6-microsoft-operating-system.html
IS317 Ethical Hacking and Network Defense. Instructor: Mr. Beard. Wednesday, January 21, 2009. IS317 Unit 6 Microsoft Operating System Vulnerabilities. Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006. Chapter 8, pp. 167–189. Quiz on Chapter 8 Reading Assignment. Check your email for quiz. Chapter 8, pp. 190–192. Hard Drives Required for LAB. DOWNLOADING AND INSTALLING MBSA. Submit a screen shot showing the Microsoft Baseine Security Analyzer Setup.