<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ckherman1</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ckherman1"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Ckherman1"/>
	<updated>2026-04-30T15:31:27Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Main_Page&amp;diff=5334</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Main_Page&amp;diff=5334"/>
		<updated>2012-03-15T21:56:24Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Welcome to the CNT Wiki&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To prevent spam on this wiki we require user account creation to create and edit pages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 600%; line-height: 100%&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: red&amp;quot;&amp;gt;ATTENTION ALL CNT STUDENTS:&amp;lt;/span&amp;gt; Please complete our [https://ihcc.us2.qualtrics.com/SE/?SID=SV_1EWAAmoUsrVN0Co Farticulation survey] by Friday, March 36!&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Program Information==&lt;br /&gt;
&lt;br /&gt;
* [[Open Lab Schedule|Open lab schedule]] for the current semester.&lt;br /&gt;
* [[Certification Information]]&lt;br /&gt;
* [[Current Student FAQ|Current Student Frequently Asked Questions]]&lt;br /&gt;
* [[CNT Course Guide]]&lt;br /&gt;
* [http://www.inverhills.edu/departments/cnt/outcomes.aspx Network Technology &amp;amp; Security AAS &amp;amp; Certificates]&lt;br /&gt;
* [http://www.inverhills.edu/departments/cis/outcomes.aspx Microcomputer Software Support Specialist AAS &amp;amp; Certificates]&lt;br /&gt;
* [[Network Technology &amp;amp; Security Course Sequencing|Network Technology &amp;amp; Security Sample Course Sequencing]]&lt;br /&gt;
* [[ITC Course Credit Equivalency for IT Exams]]&lt;br /&gt;
* [[About the CNT Department and Programs]]&lt;br /&gt;
* [[IT Career Assessments]]&lt;br /&gt;
* [[IT Career Links]]&lt;br /&gt;
* [[Information for CNT Instructors]]&lt;br /&gt;
&lt;br /&gt;
== Course Information ==&lt;br /&gt;
=== Courses taught by [[User:BenFranske|Dr. Ben Franske]] ===&lt;br /&gt;
==== Operating Systems ====&lt;br /&gt;
* [[Franske CNT-2311|CNT 2311: Administering Linux Operating Systems]]&lt;br /&gt;
* [[Franske CNT-2451|CNT 2451: Windows Operating Systems]]&lt;br /&gt;
* [[Franske CNT-2453|CNT 2453: Windows Server Network Infrastructure]]&lt;br /&gt;
==== Networking ====&lt;br /&gt;
* [[Franske CNT-2510|CNT 2510: Networking Essentials (CCNA 1)]]&lt;br /&gt;
* [[Franske CNT-2520|CNT 2520: Network Routers and Routing Fundamentals (CCNA 2)]]&lt;br /&gt;
* [[Franske CNT-2530|CNT 2530: Switching Fundamentals and Intermediate Routing (CCNA 3)]]&lt;br /&gt;
* [[Franske CNT-2540|CNT 2540: Wide Area Network Technologies (CCNA 4)]]&lt;br /&gt;
* [[Franske CNT-2612|CNT 2612: CCNP 1 Network Switching]]&lt;br /&gt;
&lt;br /&gt;
==== Security ====&lt;br /&gt;
* [[Franske CNT-2820|CNT 2820: Information Systems Security Fundamentals]]&lt;br /&gt;
* [[Franske CNT-2831|CNT 2831: Implementing Cisco IOS Network Security (CCNA Security)]]&lt;br /&gt;
==== Other Classes ====&lt;br /&gt;
* [[Franske CNT-2189|CNT 2189: Internship Information Technology]]&lt;br /&gt;
* [[Franske CNT-2250 CCDA|CNT 2250: Special Topics in CNT - CCDA Independent Study]]&lt;br /&gt;
* [[Franske CNT-2300|CNT 2300: PC Hardware and Software (A+)]]&lt;br /&gt;
* [[Franske CNT-2722|CNT 2722: Building the Foundation to IP Telephony]]&lt;br /&gt;
&lt;br /&gt;
==== Other Information ====&lt;br /&gt;
* [[Franske Book List|Book List]]&lt;br /&gt;
* [[Franske Current Student Projects|List of class projects currently being worked on by students]]&lt;br /&gt;
&lt;br /&gt;
== Technical Information ==&lt;br /&gt;
=== Networking Equipment ===&lt;br /&gt;
* [[Password Recovery and Device Reset Procedures]]&lt;br /&gt;
* [[Router Documentation]]&lt;br /&gt;
* [[Switch Documentation]]&lt;br /&gt;
* [[Vyatta|Using the Vyatta open source routing platform]]&lt;br /&gt;
* [[Networking cables]]&lt;br /&gt;
* [[Cisco Wireless Access Points|How to configure Cisco 1200 and 1242 series access points]]&lt;br /&gt;
* [[CNT Network Design &amp;amp; Useage]]&lt;br /&gt;
&lt;br /&gt;
=== Operating Systems ===&lt;br /&gt;
* [[Introduction to DOS]] - Work In Progress&lt;br /&gt;
&lt;br /&gt;
===Virtual Machines===&lt;br /&gt;
* [[VMWare Setup|Instructions for creating VMWare machines from the CNT template]]&lt;br /&gt;
* [[VirtualBox Startup Script|Instructions for creating a VirtualBox startup script to save VMs in specific location]]&lt;br /&gt;
&lt;br /&gt;
===Wiki Help===&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:Tutorial Wikipedia Tutorial]&lt;br /&gt;
* [http://meta.wikimedia.org/wiki/Help:Editing Editing Help]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:Cheatsheet Wiki Markup Cheatsheet]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Help:Wikipedia:_The_Missing_Manual Wikipedia: The Missing Manual]&lt;br /&gt;
* [http://www.mediawiki.org/wiki/Help:Formatting Formatting instructions]&lt;br /&gt;
&lt;br /&gt;
== Lab Information==&lt;br /&gt;
* [[Tasks for student lab assistants|List of tasks for student lab assistants]]&lt;br /&gt;
&lt;br /&gt;
== Software Resources ==&lt;br /&gt;
* [http://msdn08.e-academy.com/inverhills_CNT MSDN Academic Alliance] (Microsoft Software, requires IHCC login)&lt;br /&gt;
* [http://info.inverhills.edu/eacademy/eacademyvmware.asp VMware eAcademy] (VMware Software, requires IHCC login)&lt;br /&gt;
* [https://learningnetwork.cisco.com/community/connections/games Cisco Online Games]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5267</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5267"/>
		<updated>2012-02-29T20:36:58Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* CNT 2612 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2012=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
*STP Study Guide - Kevin M.&lt;br /&gt;
* Reformating Wiki Course Guide - Billy A. &amp;amp; Matt M.&lt;br /&gt;
* Asterisk Configuration C.Hermanson&lt;br /&gt;
* Implementing QOS on a multilayer switch M.Luger&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==CNT 2831==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Routing Protocol Comparison Chart &amp;amp; Configuration Instructions - John Cocchiarella, Tyler Grey&lt;br /&gt;
* IPv6 Routing Protocol Configurations - David Favilla, Christopher Abel&lt;br /&gt;
* GPON Gigabit Passive Optical Networks (ITU-T G.948) - Jesse Thorpe&lt;br /&gt;
* Exam Question Formatting - Josh K.&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Enterprise Network Case Study and Diagramming - Christopher Moosbrugger&lt;br /&gt;
* Update CCNA 4 SDM Labs to CCP Labs - Billy &amp;amp; Matt&lt;br /&gt;
* Ethernet Link Aggregation - Monique&lt;br /&gt;
* IPv6 Over IPv4 Tunnel - Clay &amp;amp; Curt&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5261</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5261"/>
		<updated>2012-02-29T20:30:56Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Asterisk configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2012=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==CNT 2831==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Routing Protocol Comparison Chart &amp;amp; Configuration Instructions - John Cocchiarella, Tyler Grey&lt;br /&gt;
* IPv6 Routing Protocol Configurations - David Favilla, Christopher Abel&lt;br /&gt;
* GPON Gigabit Passive Optical Networks (ITU-T G.948) - Jesse Thorpe&lt;br /&gt;
* Exam Question Formatting - Josh K.&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Enterprise Network Case Study and Diagramming - Christopher Moosbrugger&lt;br /&gt;
* Update CCNA 4 SDM Labs to CCP Labs - Billy &amp;amp; Matt&lt;br /&gt;
* Ethernet Link Aggregation - Monique&lt;br /&gt;
* IPv6 Over IPv4 Tunnel - Clay &amp;amp; Curt&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5260</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5260"/>
		<updated>2012-02-29T20:30:06Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* CNT 2612 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2012=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
*&lt;br /&gt;
=Asterisk configuration=&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==CNT 2831==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Routing Protocol Comparison Chart &amp;amp; Configuration Instructions - John Cocchiarella, Tyler Grey&lt;br /&gt;
* IPv6 Routing Protocol Configurations - David Favilla, Christopher Abel&lt;br /&gt;
* GPON Gigabit Passive Optical Networks (ITU-T G.948) - Jesse Thorpe&lt;br /&gt;
* Exam Question Formatting - Josh K.&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Enterprise Network Case Study and Diagramming - Christopher Moosbrugger&lt;br /&gt;
* Update CCNA 4 SDM Labs to CCP Labs - Billy &amp;amp; Matt&lt;br /&gt;
* Ethernet Link Aggregation - Monique&lt;br /&gt;
* IPv6 Over IPv4 Tunnel - Clay &amp;amp; Curt&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5117</id>
		<title>Franske CNT-2612</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5117"/>
		<updated>2012-01-30T21:26:04Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Chapter 3 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2612: CCNP 1 Network Switching classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2612 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Participation|Spring 2012 Participation Assignments]]&lt;br /&gt;
* [[Franske CNT-2612 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Study Guides =&lt;br /&gt;
== Chapter 3 ==&lt;br /&gt;
[[ Study Guide ]]&lt;br /&gt;
==  ==&lt;br /&gt;
*[[ STP Study Guide ]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [http://wiki.ihcnt.net/w/IOS_vs._CatOS:_Basic_Configuration IOS vs. CatOS: Basic Configuration]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/AAA_with_802.1x_and_port_based_authentication AAA with 802.1x and Port-based Authentication]&lt;br /&gt;
* [[IPv6 Tunnel]]&lt;br /&gt;
*[[Introduction to GNS3]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5115</id>
		<title>Franske CNT-2612</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5115"/>
		<updated>2012-01-30T21:25:27Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Chapter 3 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2612: CCNP 1 Network Switching classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2612 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Participation|Spring 2012 Participation Assignments]]&lt;br /&gt;
* [[Franske CNT-2612 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Study Guides =&lt;br /&gt;
== Chapter 3 ==&lt;br /&gt;
[[ Study Guide ]]&lt;br /&gt;
*[[ STP Study Guide ]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [http://wiki.ihcnt.net/w/IOS_vs._CatOS:_Basic_Configuration IOS vs. CatOS: Basic Configuration]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/AAA_with_802.1x_and_port_based_authentication AAA with 802.1x and Port-based Authentication]&lt;br /&gt;
* [[IPv6 Tunnel]]&lt;br /&gt;
*[[Introduction to GNS3]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5114</id>
		<title>Franske CNT-2612</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=5114"/>
		<updated>2012-01-30T21:25:08Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Chapter 3 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2612: CCNP 1 Network Switching classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2612 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2612 SP12 Participation|Spring 2012 Participation Assignments]]&lt;br /&gt;
* [[Franske CNT-2612 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Study Guides =&lt;br /&gt;
== Chapter 3 ==&lt;br /&gt;
[[ Study Guide ]]&lt;br /&gt;
[[ STP Study Guide ]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [http://wiki.ihcnt.net/w/IOS_vs._CatOS:_Basic_Configuration IOS vs. CatOS: Basic Configuration]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/AAA_with_802.1x_and_port_based_authentication AAA with 802.1x and Port-based Authentication]&lt;br /&gt;
* [[IPv6 Tunnel]]&lt;br /&gt;
*[[Introduction to GNS3]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=STP_Study_Guide&amp;diff=5111</id>
		<title>STP Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=STP_Study_Guide&amp;diff=5111"/>
		<updated>2012-01-30T21:22:13Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: Created page with &amp;quot;==Spanning Tree Protocol Study Guide== ===BY: Mike Luger, Curt Hermanson, Phil Gimber=== *	Evolution of STP Basics *	Evolution of STP *	STP (Spanning Tree Protocol) – Eliminate...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Spanning Tree Protocol Study Guide==&lt;br /&gt;
===BY: Mike Luger, Curt Hermanson, Phil Gimber===&lt;br /&gt;
*	Evolution of STP Basics&lt;br /&gt;
*	Evolution of STP&lt;br /&gt;
*	STP (Spanning Tree Protocol) – Eliminates loops at layer 2 topology &lt;br /&gt;
==STP initially converges on a logically loop-free network topology==&lt;br /&gt;
*1)	Elects one root bridge&lt;br /&gt;
*2)	Selects the root port on all nonroot bridges&lt;br /&gt;
*3)	Selects the designated port on each segment&lt;br /&gt;
==Elects One Root Bridge==&lt;br /&gt;
*•	The protocol uses a process to elect a root bridge&lt;br /&gt;
*•	Only one bridge acts as the root bridge in a given network per VLAN&lt;br /&gt;
*•	On the root bridge, all ports act as designated ports&lt;br /&gt;
*•	Switch with lowest priority parameter is elected as root&lt;br /&gt;
*•	STP Step 2 (cont)&lt;br /&gt;
==Selects the Root Port on All Non-root Bridges==&lt;br /&gt;
*•	The protocol establishes one root port on each nonroot bridge. &lt;br /&gt;
*•	The root port is the lowest-cost path from the nonroot bridge to the root bridge&lt;br /&gt;
==Selects Designated Port on Each Segment==&lt;br /&gt;
*•	On each segment, STP establishes one designated port on the bridge that has the lowest path cost to the root bridge&lt;br /&gt;
*•	The switch primarily chooses a designated port as the least-cost path to the root bridge&lt;br /&gt;
*•	In the event of a tie, the bridge ID acts as the tiebreaker&lt;br /&gt;
*•	Port Roles&lt;br /&gt;
&lt;br /&gt;
==There are four roles of ports under STP==&lt;br /&gt;
*1)  Root &lt;br /&gt;
*2)  Designated&lt;br /&gt;
*3)  Non-Designated&lt;br /&gt;
*4)  Disabled&lt;br /&gt;
&lt;br /&gt;
==There are Five Port States==&lt;br /&gt;
*•	Blocking&lt;br /&gt;
*•	Listening&lt;br /&gt;
*•	Learning&lt;br /&gt;
*•	Forwarding&lt;br /&gt;
*•	Disabled&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSTP==&lt;br /&gt;
RSTP is not so much a new protocol, but rather an improved and faster version of STP. It preserves all the basic concepts of STP and interoperates with it as well. Users familiar with the operation of STP can quickly learn the new algorithm since both the terminology and basic parameters have been left unchanged.&lt;br /&gt;
&lt;br /&gt;
==Tree Topology==&lt;br /&gt;
&lt;br /&gt;
Spanning Tree topology can be thought of as a tree: it includes a root (a Root Bridge), branches&lt;br /&gt;
(LANs and Designated Switches), and leaves (End Nodes). On a tree there are no disconnected parts that are considered part of the tree; that is, the tree encompasses all of its leaves. In addition, there are no loops in a tree. If you trace a path from one leaf to any other leaf, you will find there is one and only one possible path. This is true of the Spanning Tree topology as well. It organizes and connects switches into a loop-free topology while leaving no segments isolated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Root Bridge==&lt;br /&gt;
Just as a tree has a root from which all branches spring, Spanning Tree has a Root Bridge . Only one Root Bridge can exist in any given network. Although any switch can be a Root Bridge, the switch with the best Bridge ID becomes the Root Bridge.  There are two parts to the Bridge ID: a user selected priority and the MAC address. The switch with the lowest numerical value of the priority component becomes the Root Bridge. When all switches have the same priority value, the one with the lowest MAC address becomes the Root Bridge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Designated Bridges==&lt;br /&gt;
A simple way to prevent loops in the network is to ensure only one bridge is responsible for forwarding traffic from the direction of the root into any given link (branch).  As long as only one active path from a root to any end node (leaf) exists, there will be no loops in the topology. The bridge responsible for forwarding traffic in the direction from the root to a given link is known as the Designated Bridge of that link.&lt;br /&gt;
&lt;br /&gt;
==How RSTP works==&lt;br /&gt;
The main difference in the operation of STP and RSTP is that RSTP no longer relies on conservative timers to re-converge after a topology change. In order to accomplish this, the algorithm does the following:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*1. It monitors MAC operational states and retires ports that are no longer functional.&lt;br /&gt;
*2. It processes inferior BPDUs to detect topology changes.&lt;br /&gt;
*3. It keeps track of ports that provide alternative paths to the Root Bridge.&lt;br /&gt;
*4. If a Root Port fails, RSTP can quickly retire the Port and make an Alternative port its new Root Port. This new Root Port can be placed in the forwarding state without delay.&lt;br /&gt;
*5. When bridges are connected via point-to-point links (directly connected), they use handshake (sync), rather than timers to transition a Designated Port to Forwarding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSTP Topology Change Mechanism==&lt;br /&gt;
When an RSTP bridge detects a topology change it performs the following actions&lt;br /&gt;
The RSTP Bridge starts the TC while time with a value equal to twice the hello time for all its nonedge designated ports and its root, port if necessary. The TC While time is the interval during which the RSTP Bridge actively informs the rest of the bridges in the network of a topology. It then flushing the MAC addresses associated with all nonedge ports. And as long as the TC While timer is running the BPDUs will be sent out of the port will have the TC bit set.&lt;br /&gt;
 &lt;br /&gt;
==Bridge Identifier for PVRST+==&lt;br /&gt;
*•	Bridge Priority A 4-bit field still used to carry bridge priority&lt;br /&gt;
*•	Extended System ID&lt;br /&gt;
*•	Mac Address&lt;br /&gt;
 &lt;br /&gt;
==Only four high-order bits of the 16 bit bridge priority field carry actual priority==&lt;br /&gt;
*•	Cisco STP Default Config&lt;br /&gt;
*•	PVST+&lt;br /&gt;
*•	PVRST+&lt;br /&gt;
*•	MST&lt;br /&gt;
 &lt;br /&gt;
==PortFast==&lt;br /&gt;
Spanning Tree Portfast causes an interface configured as a layer 2 access port to enter the forwarding state immediately.&lt;br /&gt;
&lt;br /&gt;
*Conf t&lt;br /&gt;
*int fa 0/1&lt;br /&gt;
*spanning-tree portfast&lt;br /&gt;
&lt;br /&gt;
*confirm with show spanning-tree interface Fastethernet  0/1&lt;br /&gt;
&lt;br /&gt;
==Config the Basic Parameters of PVRST+==&lt;br /&gt;
*conf t&lt;br /&gt;
*spanning-tree mode rapid-pvst&lt;br /&gt;
*spanning-tree vlan 2 root primary&lt;br /&gt;
*spanning tree- vlan 3 root secondary&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic%27s_of_Penetration_Testing&amp;diff=4986</id>
		<title>Basic&#039;s of Penetration Testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic%27s_of_Penetration_Testing&amp;diff=4986"/>
		<updated>2011-12-13T21:37:44Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /*  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=            =&lt;br /&gt;
&lt;br /&gt;
A penetration test (otherwise known as a pentest) is used to expose a weakness in a computer system such as a company server or network. This kind of test allows a company to see where its vulnerabilities lie and attempt to fix them. Most often the test is conducted by some one that is not directly employed by the organization but is contracted from outside it.&lt;br /&gt;
=           =&lt;br /&gt;
Unlike a hacker the tester is given permission and is paid to exploit the organizations security weaknesses. The tester does not passively scan for security weaknesses either. While penetrating the system this will often times halt, slow down or even stop processes within the company. This is meant to simulate an actual cyber-attack on the organization. This simulation not only exposes security loop holes but tests fail safes (if any) that are put in place. Generally a pentest is conducted on a system that is vulnerable to attack and has important data, such as a banks web page with account information.&lt;br /&gt;
=     = &lt;br /&gt;
After the test is completed the tester generates a report known as a “penetration test report”. This report is short and to the point. The report details the method of attack that was used, and what information was compromised during the attack as well as the value of the information exposed. Also the report can contain preventative measures for such an attack, or the organization can come up with their own solutions.&lt;br /&gt;
=          =&lt;br /&gt;
There are three primary methods of penetration testing. All three are based on the knowledge that the tester has of the system before attempting to breach it. With the black box method the tester has no foreknowledge of the system or its infrastructure. The tester has to figure out where the system is and what type it is as well as the device it is operating on. After this has been deduced the tester can start attempting to breach the system. Because this type of attack is a simulation of an outsider hacking into a system this is the closest of the three methods an organization can get to a real attack.&lt;br /&gt;
=             =&lt;br /&gt;
The other two methods are known as white box and grey box. A white box attack is essentially the opposite of a black box attack. The tester has all the information about the system and its infrastructure, including in depth diagrams of the network and IP addresses as well as source codes for the organizations custom applications. With the grey box method the tester only has some of the information pertaining to a system and its network. These types of attacks are useful in simulating an internal threat to the organization, i.e. an employee who either intentionally or purposefully violates system security.&lt;br /&gt;
=          =&lt;br /&gt;
The Open Source Security Testing Methodology Manual or OSSTMM is a manual that discusses penetration testing in greater detail. The manual covers everything from fraud, social engineering attacks and network security, and physical security. The OOSTMM provides details on what items need tested. It also explains what to do before during and after a security test, as well as how to evaluate the results of the test.&lt;br /&gt;
=           =&lt;br /&gt;
These tests do not come without some risks of their own however. As mentioned earlier the test is meant to exploit weaknesses and vulnerabilities. These exploits can have consequences. During a test the system may slow down, crash or even worse break and become inoperable. With an experienced tester these risks are minimalized.&lt;br /&gt;
=           =&lt;br /&gt;
Pentesting is and invaluable tool for many companies and organizations. The report generated from this test will allow a corporation to identify and determine many things when conducting a vulnerability assessment. The test results can show the likely hood of a certain type of threat, its impact on operations, shows previously unknown loopholes, and the effectiveness of current security measures. In fact many organizations are mandated by the government to perform pentests as part of a security audit. The Payment Card Industry Data Security Standard (PCI DSS) requires organizations that hold credit card information to conduct annual and ongoing Pentesting after a system change.&lt;br /&gt;
=          =&lt;br /&gt;
Penetration testing is akin to running a drill or exercise. When a building conducts a fire drill it is testing the effectiveness of evacuation procedures as well as alarm systems. If the drill was never conducted and the building caught fire many lives could be lost. Just as a bank that offers online banking run drills with its online security through Pentesting. Imagine how much important personal information a person places online through their online banking service, if threats aren’t discovered through pen testers and then sent to the bank to be evaluated and prevented someone with malicious intent could end up with your credit information.&lt;br /&gt;
&lt;br /&gt;
=           =&lt;br /&gt;
By: Curt Hermanson and Byron Schwarz&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic%27s_of_Penetration_Testing&amp;diff=4985</id>
		<title>Basic&#039;s of Penetration Testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic%27s_of_Penetration_Testing&amp;diff=4985"/>
		<updated>2011-12-13T21:32:04Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: Created page with &amp;quot;=            =  A penetration test (otherwise known as a pentest) is used to expose a weakness in a computer system such as a company server or network. This kind of test allows ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=            =&lt;br /&gt;
&lt;br /&gt;
A penetration test (otherwise known as a pentest) is used to expose a weakness in a computer system such as a company server or network. This kind of test allows a company to see where its vulnerabilities lie and attempt to fix them. Most often the test is conducted by some one that is not directly employed by the organization but is contracted from outside it.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4984</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4984"/>
		<updated>2011-12-13T21:29:15Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== &#039;&#039;&#039;Projects&#039;&#039;&#039; ==&lt;br /&gt;
* [[Basic&#039;s of Penetration Testing]]&lt;br /&gt;
=== Multimedia ===&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Franske_CNT-2820&amp;diff=4983</id>
		<title>Talk:Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Franske_CNT-2820&amp;diff=4983"/>
		<updated>2011-12-13T21:26:00Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Penetration testing =&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4982</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4982"/>
		<updated>2011-12-13T21:24:51Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== &#039;&#039;&#039;Projects&#039;&#039;&#039; ==&lt;br /&gt;
=== Multimedia ===&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4981</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4981"/>
		<updated>2011-12-13T21:24:02Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Projects ==&lt;br /&gt;
=== Multimedia ===&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4980</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4980"/>
		<updated>2011-12-13T21:22:50Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Multimedia ==&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4979</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4979"/>
		<updated>2011-12-13T21:21:00Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Penetration Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
&lt;br /&gt;
=== Penetration Testing ===&lt;br /&gt;
Penetration Testing&lt;br /&gt;
&lt;br /&gt;
A penetration test (otherwise known as a pentest) is used to expose a weakness in a computer system such as a company server or network. This kind of test allows a company to see where its vulnerabilities lie and attempt to fix them. Most often the test is conducted by some one that is not directly employed by the organization but is contracted from outside it.&lt;br /&gt;
Unlike a hacker the tester is given permission and is paid to exploit the organizations security weaknesses. The tester does not passively scan for security weaknesses either. While penetrating the system this will often times halt, slow down or even stop processes within the company. This is meant to simulate an actual cyber-attack on the organization. This simulation not only exposes security loop holes but tests fail safes (if any) that are put in place. Generally a pentest is conducted on a system that is vulnerable to attack and has important data, such as a banks web page with account information.&lt;br /&gt;
After the test is completed the tester generates a report known as a “penetration test report”. This report is short and to the point. The report details the method of attack that was used, and what information was compromised during the attack as well as the value of the information exposed. Also the report can contain preventative measures for such an attack, or the organization can come up with their own solutions.&lt;br /&gt;
There are three primary methods of penetration testing. All three are based on the knowledge that the tester has of the system before attempting to breach it. With the black box method the tester has no foreknowledge of the system or its infrastructure. The tester has to figure out where the system is and what type it is as well as the device it is operating on. After this has been deduced the tester can start attempting to breach the system. Because this type of attack is a simulation of an outsider hacking into a system this is the closest of the three methods an organization can get to a real attack.&lt;br /&gt;
The other two methods are known as white box and grey box. A white box attack is essentially the opposite of a black box attack. The tester has all the information about the system and its infrastructure, including in depth diagrams of the network and IP addresses as well as source codes for the organizations custom applications. With the grey box method the tester only has some of the information pertaining to a system and its network. These types of attacks are useful in simulating an internal threat to the organization, i.e. an employee who either intentionally or purposefully violates system security.&lt;br /&gt;
The Open Source Security Testing Methodology Manual or OSSTMM is a manual that discusses penetration testing in greater detail. The manual covers everything from fraud, social engineering attacks and network security, and physical security. The OOSTMM provides details on what items need tested. It also explains what to do before during and after a security test, as well as how to evaluate the results of the test.&lt;br /&gt;
These tests do not come without some risks of their own however. As mentioned earlier the test is meant to exploit weaknesses and vulnerabilities. These exploits can have consequences. During a test the system may slow down, crash or even worse break and become inoperable. With an experienced tester these risks are minimalized.&lt;br /&gt;
Pentesting is and invaluable tool for many companies and organizations. The report generated from this test will allow a corporation to identify and determine many things when conducting a vulnerability assessment. The test results can show the likely hood of a certain type of threat, its impact on operations, shows previously unknown loopholes, and the effectiveness of current security measures. In fact many organizations are mandated by the government to perform pentests as part of a security audit. The Payment Card Industry Data Security Standard (PCI DSS) requires organizations that hold credit card information to conduct annual and ongoing Pentesting after a system change.&lt;br /&gt;
Penetration testing is akin to running a drill or exercise. When a building conducts a fire drill it is testing the effectiveness of evacuation procedures as well as alarm systems. If the drill was never conducted and the building caught fire many lives could be lost. Just as a bank that offers online banking run drills with its online security through Pentesting. Imagine how much important personal information a person places online through their online banking service, if threats aren’t discovered through pen testers and then sent to the bank to be evaluated and prevented someone with malicious intent could end up with your credit information.&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Multimedia ==&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4978</id>
		<title>Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820&amp;diff=4978"/>
		<updated>2011-12-13T21:20:10Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2820 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
&lt;br /&gt;
=== Penetration Testing ===&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Multimedia ==&lt;br /&gt;
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]&lt;br /&gt;
* Security Now #6: Mechanical &amp;amp; Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]&lt;br /&gt;
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]&lt;br /&gt;
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]&lt;br /&gt;
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]&lt;br /&gt;
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]&lt;br /&gt;
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]&lt;br /&gt;
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]&lt;br /&gt;
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]&lt;br /&gt;
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]&lt;br /&gt;
=== Wireless ===&lt;br /&gt;
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]&lt;br /&gt;
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]&lt;br /&gt;
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]&lt;br /&gt;
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;br /&gt;
&lt;br /&gt;
== Web Sites ==&lt;br /&gt;
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]&lt;br /&gt;
&lt;br /&gt;
== Security Related Journal Articles ==&lt;br /&gt;
=== Finding Articles ===&lt;br /&gt;
* [http://www.openj-gate.com Open J-Gate]&lt;br /&gt;
* [http://www.doaj.org/doaj?func=searchArticles Directory of Open Access Journals]&lt;br /&gt;
* [http://scholar.google.com Google Scholar] - Note this may include links to non-free articles&lt;br /&gt;
&lt;br /&gt;
=== Specific Journals ===&lt;br /&gt;
* [http://www.hindawi.com/journals/is/ EURASIP Journal on Information Security]&lt;br /&gt;
* [http://ijcnis.kust.edu.pk/index International Journal of Communication Networks and Information Security]&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Franske_CNT-2820&amp;diff=4977</id>
		<title>Talk:Franske CNT-2820</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Franske_CNT-2820&amp;diff=4977"/>
		<updated>2011-12-13T21:13:54Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: Created page with &amp;quot;Penetration testing&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Penetration testing&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Asterisk_Notes&amp;diff=4850</id>
		<title>Asterisk Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Asterisk_Notes&amp;diff=4850"/>
		<updated>2011-12-05T21:57:37Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;11-28-11     &lt;br /&gt;
Astrerisk is a free call process, provides support for cards like T1 - it acts like a gateway, or you can employ a service (server to act as the card or gateway)   It has become much better over the last five years and has been aroud for 7 or 8 but was no very stable in the beginning.  You will find it built into most open source services.  You can get asterisk to work on windows but it is not designed for that.  The 7900 series of cisco phones work well with asterisk and can get a 7960 for around 20 bucks on ebay.  &lt;br /&gt;
&lt;br /&gt;
We will be using Oracle&#039;s VirtualBox to download Asterisk to.  You will need to create a storage space on your D drive.  Make a new folder with your name and semester &amp;quot;Name-FA11&amp;quot; then close.&lt;br /&gt;
&lt;br /&gt;
Next open up VirtualBox &#039;&#039;settings&#039;&#039; and under &#039;&#039;general&#039;&#039; in the default box find the folder you just made and click ok.  Your information will now be saved there.&lt;br /&gt;
&lt;br /&gt;
Next create a new virtual machine by clicking on new machine under OS click on Linux, click &#039;&#039;next&#039;&#039;, under RAM use 768 , click &#039;&#039;next&#039;&#039;, create new hard disk, click next, VDI, next, Dynammically allocated, next location Astersiks server, default, &#039;&#039;next&#039;&#039;, then click &#039;&#039;create&#039;&#039;.  You should now see that your VM has been created.&lt;br /&gt;
&lt;br /&gt;
You will now nee to change the settings under the network by simply clicking on Network and under network click on adapter and on  attatched and change to bridged.&lt;br /&gt;
&lt;br /&gt;
**Next under storage CD/DVD Drive: click icon beside arrow change to choose a virtual disk CNT files under Linux then Ubuntu 10.10. asterisk tty1&lt;br /&gt;
You will get a couple of warnings, click on through them.  Under language choose your language (English is the only one Franske will have support for) US, enter, under keyboard click no, enter, enter, it will the start to load.  Under hostname use Asterisk, enter, yes, enter, enter, under partition move to yes click &#039;&#039;continue&#039;&#039;. Make changes to disks move to yes, &#039;&#039;continue&#039;&#039;.  The base system will now be installed.  enter your name in lowercase, password cisco, cisco again yes, no for encrypting and down arrow for no http proxy &#039;&#039;continue&#039;&#039; and it will continue installing choose no automatic updates.  Under software selection leave them all blank by using tab key to tab through to select continue after installation select yes to install bootloader.  Finish by clicking on devices and click on CD/DVD and make sure there is no check mark beside ubuntu. then click continue  &lt;br /&gt;
&lt;br /&gt;
Type your name and password that you entered&lt;br /&gt;
You are not automatically admin to become the admin you have to enter: sudo bash  You will see a # to confirm that you are now admin.  We will now edit a file by typing: nano /etc/apt/sources.list (nano is the text editor and etc is the file)  Click control W US. archive.ubuntu.com&lt;br /&gt;
Under replace with: enter mirror .rit.edu  then repeat control w and change security.ubuntu.com with the mirror.RIT.edu&lt;br /&gt;
Update by typing aptitude update, enter aptitude full-upgrade, enter, click enter for yes and update starts.  After update it will say Current Staus: 0 updates [-94]&lt;br /&gt;
We will the type: aptitude install asterisk atfpd dhcp3-server &lt;br /&gt;
enter 001 for USA country code and click continue&lt;br /&gt;
If there are errors (and ther will be) type: &lt;br /&gt;
aptitude update&lt;br /&gt;
enter&lt;br /&gt;
install aptitude update&lt;br /&gt;
enter&lt;br /&gt;
&lt;br /&gt;
to restart type:&lt;br /&gt;
shutdown -r now&lt;br /&gt;
&lt;br /&gt;
and try reinstalling if there are still errors, you will need to log back in and refollow steps to update&lt;br /&gt;
&lt;br /&gt;
We should be able to program settings for 7960 phone&lt;br /&gt;
nano sip.com&lt;br /&gt;
nano extensions.com&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;better notes by Greg 2011 11 28&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
asterisk.org&lt;br /&gt;
&lt;br /&gt;
open source / free call processor&lt;br /&gt;
&lt;br /&gt;
gateway&lt;br /&gt;
buy VOIP service from service provider on internet&lt;br /&gt;
    connects over network to provider with actual gateway&lt;br /&gt;
&lt;br /&gt;
asterisk has been around for 7 - 8 years&lt;br /&gt;
    early days, not ready for prime time, not stable, poor configuration&lt;br /&gt;
    last 5 years, better&lt;br /&gt;
    many small businesses use asterisk,  &lt;br /&gt;
    built into other products,  often the engine is asterisk&lt;br /&gt;
&lt;br /&gt;
can be customized&lt;br /&gt;
    call centers&lt;br /&gt;
    robo dialing&lt;br /&gt;
&lt;br /&gt;
GOALS:  Walk through installing asterisk&lt;br /&gt;
    install on linux  (install linux, then install asterisk&lt;br /&gt;
    Cisco 7960 phones popular with asterisk&lt;br /&gt;
&lt;br /&gt;
Virtual box &lt;br /&gt;
&lt;br /&gt;
create folder on D drive with username, semester, and year &lt;br /&gt;
update default folder in virtualbox general&lt;br /&gt;
    virtualbox settings -- general&lt;br /&gt;
    New&lt;br /&gt;
        asterisk server&lt;br /&gt;
        linux&lt;br /&gt;
        ubuntu&lt;br /&gt;
        768 MB ram&lt;br /&gt;
        Create new hard disk&lt;br /&gt;
        VDI (default)&lt;br /&gt;
        Dynamically allocated&lt;br /&gt;
        8 GB is enough for virtual disk&lt;br /&gt;
        Confirm that drive is installed in expected folder&lt;br /&gt;
&lt;br /&gt;
        Create&lt;br /&gt;
        Create&lt;br /&gt;
&lt;br /&gt;
    Change Network Setting   (click on Network)&lt;br /&gt;
        Attached to:  Bridged Adapter&lt;br /&gt;
        (connects virtual machine directly to network card of computer)&lt;br /&gt;
&lt;br /&gt;
    ubuntu server file is already on system&lt;br /&gt;
&lt;br /&gt;
    Click on Storage&lt;br /&gt;
        click on IDE Controller / Empty&lt;br /&gt;
        click on disk on far right side (next ot IDE Secondary Master)&lt;br /&gt;
            Choose Virtual CD Disk File&lt;br /&gt;
            D:\\CNT Files\Linux Install CDs\&lt;br /&gt;
                ubuntu-10.10-server-i386.iso&lt;br /&gt;
&lt;br /&gt;
    Click Start to start the virtual machine&lt;br /&gt;
        OK through warning about keyboard capture&lt;br /&gt;
        OK through virtual colors&lt;br /&gt;
        OK through audio problems&lt;br /&gt;
        English&lt;br /&gt;
    Enter&lt;br /&gt;
    Install Ubuntu Server&lt;br /&gt;
        OK through mouse pointer&lt;br /&gt;
        OK through color&lt;br /&gt;
    Enter through English&lt;br /&gt;
    Enter through United States&lt;br /&gt;
    no for detect keyboard&lt;br /&gt;
    USA&lt;br /&gt;
    Standard USA keyboard&lt;br /&gt;
    hostname   asterisk&lt;br /&gt;
    America/Chicago time zone&lt;br /&gt;
    Guided  - use entire disk adn set up LVM&lt;br /&gt;
    Select Disk -- SCSI3&lt;br /&gt;
    select YES&lt;br /&gt;
    use default, 8.3 GB&lt;br /&gt;
    YES - Write changes to disk&lt;br /&gt;
&lt;br /&gt;
        lower corner of screen will show activity to hard disk, CD, &lt;br /&gt;
            and other devices.&lt;br /&gt;
&lt;br /&gt;
    Create User Accounts&lt;br /&gt;
        Full Name&lt;br /&gt;
        username   &lt;br /&gt;
        password:  cisco&lt;br /&gt;
               cisco&lt;br /&gt;
        Yes -- accept weak password&lt;br /&gt;
        NO  -- do not encrypt home directory&lt;br /&gt;
        empty -- no http proxy&lt;br /&gt;
&lt;br /&gt;
    NO automatic updates&lt;br /&gt;
&lt;br /&gt;
    Software to Install&lt;br /&gt;
        Leave blank&lt;br /&gt;
        TAB to reach Continue button&lt;br /&gt;
            the distribution is Oct 2010&lt;br /&gt;
            current Oct2011 server edition is the same&lt;br /&gt;
            &lt;br /&gt;
    Yes -- install GRUB boot loader to master boot record&lt;br /&gt;
&lt;br /&gt;
Remove virtual CD before&lt;br /&gt;
    Pull down Devices to --&amp;gt; CD/DVD Devices&lt;br /&gt;
&lt;br /&gt;
Login using name and password that we specified&lt;br /&gt;
&lt;br /&gt;
become administrator&lt;br /&gt;
&lt;br /&gt;
    sudo bash &lt;br /&gt;
    cisco&lt;br /&gt;
&lt;br /&gt;
    nano /etc/apt/soruces.list&lt;br /&gt;
&lt;br /&gt;
    ctrl-w&lt;br /&gt;
    ctrl-r&lt;br /&gt;
    search for us.archive.ubuntu.com&lt;br /&gt;
    replace with mirror.rit.edu&lt;br /&gt;
        In vi this is :1,$s/us.archive.ubuntu.com/mirror.rit.edu/g&lt;br /&gt;
        14 lines are changed&lt;br /&gt;
    search for security.ubuntu.com&lt;br /&gt;
    replace with mirror.rit.edu&lt;br /&gt;
        :1,$s/security.ubuntu.com/mirror.rit.edu/g&lt;br /&gt;
        6 lines change&lt;br /&gt;
    ctrl-o&lt;br /&gt;
    enter&lt;br /&gt;
    ctrl-x  to exit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_______________________________________________________________________________________________________________&lt;br /&gt;
&lt;br /&gt;
Notes 2011 11 30&lt;br /&gt;
&lt;br /&gt;
The problem with the asterisk install was the age of the operating system.  The fix is to upgrade the Ubuntu OS to a later version that is compatible with the current asterisk distribution.&lt;br /&gt;
&lt;br /&gt;
The upgrade process includes the following.&lt;br /&gt;
1.  login &lt;br /&gt;
2.  become root via the command&lt;br /&gt;
    sudo bash&lt;br /&gt;
3.  Edit the file,  /etc/apt/sources.list. Change the phrase, maverick, to the phrase, nantty, on every line.  &lt;br /&gt;
    The vi command phrase is :1,$s/maverick/nantty/g&lt;br /&gt;
4.  Update via the command&lt;br /&gt;
    aptitude update&lt;br /&gt;
5.  Install the upgrade via the command&lt;br /&gt;
    aptitude full-upgrade&lt;br /&gt;
      Accept this solution:   Answer Y to every prompt&lt;br /&gt;
      Click OK for the openbsd-inetd cron atd upgrade&lt;br /&gt;
      Click OK for the cron atd upgrade&lt;br /&gt;
&lt;br /&gt;
2011 12 05&lt;br /&gt;
&lt;br /&gt;
* ! &#039;&#039;&#039;&#039;&#039;exclamation marks = enter&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;nano = edit&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Unhook ethernet &amp;amp; login&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
cd/tftpboot&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
tftpboot#wget ftp://10.1.11.36/tftpboot/*&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ls    (&#039;&#039;to show listing&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
etc/network/interfaces&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
cp/etc/dhcp3/dhcpd.conf /etc/dhcpd.conf    (&#039;&#039;to copy config file from dhcpd3 to dhcpd&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Once your plugged back in and have pc and phone plugged into a poe switch&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ifup eth0&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ifconfig&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use the following command to see what is happening in real time and control c to get back&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
tail -f /var/log/syslog&lt;br /&gt;
&lt;br /&gt;
cntrl c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/etc/init.d/isc-dhcp-server start&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;If you encounter any errors with your configuration file you can edit it by going to:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
nano /etc/dhcp/dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
tail /var/log/syslog   (&#039;&#039;&#039;&#039;&#039;To show tail end of the log&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Anytime you need to make a change on the phone you will need to unplug and go through the start up process again&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
/etc/default/atftpd&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
/etc/inetd.conf&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Go to the line that starts with tftp go to end of line that and change /srvtftp to tftpboot&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ps aux | grep tftp&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
/etc/init.d/openbsd-inetd restart&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
ps aux | grep tftp&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;If the srv is still up you have kill the line&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
nano XMLDefault.cnf.xml    (&#039;&#039;&#039;&#039;&#039;for editing&#039;&#039;&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
!&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Asterisk_Notes&amp;diff=4798</id>
		<title>Asterisk Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Asterisk_Notes&amp;diff=4798"/>
		<updated>2011-11-28T21:58:17Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: Created page with &amp;quot;11-28-11      Astrerisk is a free call process, provides support for cards like T1 - it acts like a gateway, or you can employ a service (server to act as the card or gateway)   ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;11-28-11     &lt;br /&gt;
Astrerisk is a free call process, provides support for cards like T1 - it acts like a gateway, or you can employ a service (server to act as the card or gateway)   It has become much better over the last five years and has been aroud for 7 or 8 but was no very stable in the beginning.  You will find it built into most open source services.  You can get asterisk to work on windows but it is not designed for that.  The 7900 series of cisco phones work well with asterisk and can get a 7960 for around 20 bucks on ebay.  &lt;br /&gt;
&lt;br /&gt;
We will be using Oracle&#039;s VirtualBox to download Asterisk to.  You will need to create a storage space on your D drive.  Make a new folder with your name and semester &amp;quot;Name-FA11&amp;quot; then close.&lt;br /&gt;
&lt;br /&gt;
Next open up VirtualBox &#039;&#039;settings&#039;&#039; and under &#039;&#039;general&#039;&#039; in the default box find the folder you just made and click ok.  Your information will now be saved there.&lt;br /&gt;
&lt;br /&gt;
Next create a new virtual machine by clicking on new machine under OS click on Linux, click &#039;&#039;next&#039;&#039;, under RAM use 768 , click &#039;&#039;next&#039;&#039;, create new hard disk, click next, VDI, next, Dynammically allocated, next location Astersiks server, default, &#039;&#039;next&#039;&#039;, then click &#039;&#039;create&#039;&#039;.  You should now see that your VM has been created.&lt;br /&gt;
&lt;br /&gt;
You will now nee to change the settings under the network by simply clicking on Network and under network click on adapter and on  attatched and change to bridged.&lt;br /&gt;
&lt;br /&gt;
**Next under storage CD/DVD Drive: click icon beside arrow change to choose a virtual disk CNT files under Linux then Ubuntu 10.10. asterisk tty1&lt;br /&gt;
You will get a couple of warnings, click on through them.  Under language choose your language (English is the only one Franske will have support for) US, enter, under keyboard click no, enter, enter, it will the start to load.  Under hostname use Asterisk, enter, yes, enter, enter, under partition move to yes click &#039;&#039;continue&#039;&#039;. Make changes to disks move to yes, &#039;&#039;continue&#039;&#039;.  The base system will now be installed.  enter your name in lowercase, password cisco, cisco again yes, no for encrypting and down arrow for no http proxy &#039;&#039;continue&#039;&#039; and it will continue installing choose no automatic updates.  Under software selection leave them all blank by using tab key to tab through to select continue after installation select yes to install bootloader.  Finish by clicking on devices and click on CD/DVD and make sure there is no check mark beside ubuntu. then click continue  &lt;br /&gt;
&lt;br /&gt;
Type your name and password that you entered&lt;br /&gt;
You are not automatically admin to become the admin you have to enter: sudo bash  You will see a # to confirm that you are now admin.  We will now edit a file by typing: nano /etc/apt/sources.list (nano is the text editor and etc is the file)  Click control W US. archive.ubuntu.com&lt;br /&gt;
Under replace with: enter mirror .rit.edu  then repeat control w and change security.ubuntu.com with the mirror.RIT.edu&lt;br /&gt;
Update by typing aptitude update, enter aptitude full-upgrade, enter, click enter for yes and update starts.  After update it will say Current Staus: 0 updates [-94]&lt;br /&gt;
We will the type: aptitude install asterisk atfpd dhcp3-server &lt;br /&gt;
enter 001 for USA country code and click continue&lt;br /&gt;
If there are errors (and ther will be) type: &lt;br /&gt;
aptitude update&lt;br /&gt;
enter&lt;br /&gt;
install aptitude update&lt;br /&gt;
enter&lt;br /&gt;
&lt;br /&gt;
to restart type:&lt;br /&gt;
shutdown -r now&lt;br /&gt;
&lt;br /&gt;
and try reinstalling if there are still errors, you will need to log back in and refollow steps to update&lt;br /&gt;
&lt;br /&gt;
We should be able to program settings for 7960 phone&lt;br /&gt;
nano sip.com&lt;br /&gt;
nano extensions.com&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;better notes by Greg 2011 11 28&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
asterisk.org&lt;br /&gt;
&lt;br /&gt;
open source / free call processor&lt;br /&gt;
&lt;br /&gt;
gateway&lt;br /&gt;
buy VOIP service from service provider on internet&lt;br /&gt;
    connects over network to provider with actual gateway&lt;br /&gt;
&lt;br /&gt;
asterisk has been around for 7 - 8 years&lt;br /&gt;
    early days, not ready for prime time, not stable, poor configuration&lt;br /&gt;
    last 5 years, better&lt;br /&gt;
    many small businesses use asterisk,  &lt;br /&gt;
    built into other products,  often the engine is asterisk&lt;br /&gt;
&lt;br /&gt;
can be customized&lt;br /&gt;
    call centers&lt;br /&gt;
    robo dialing&lt;br /&gt;
&lt;br /&gt;
GOALS:  Walk through installing asterisk&lt;br /&gt;
    install on linux  (install linux, then install asterisk&lt;br /&gt;
    Cisco 7960 phones popular with asterisk&lt;br /&gt;
&lt;br /&gt;
Virtual box &lt;br /&gt;
&lt;br /&gt;
create folder on D drive with username, semester, and year &lt;br /&gt;
update default folder in virtualbox general&lt;br /&gt;
    virtualbox settings -- general&lt;br /&gt;
    New&lt;br /&gt;
        asterisk server&lt;br /&gt;
        linux&lt;br /&gt;
        ubuntu&lt;br /&gt;
        768 MB ram&lt;br /&gt;
        Create new hard disk&lt;br /&gt;
        VDI (default)&lt;br /&gt;
        Dynamically allocated&lt;br /&gt;
        8 GB is enough for virtual disk&lt;br /&gt;
        Confirm that drive is installed in expected folder&lt;br /&gt;
&lt;br /&gt;
        Create&lt;br /&gt;
        Create&lt;br /&gt;
&lt;br /&gt;
    Change Network Setting   (click on Network)&lt;br /&gt;
        Attached to:  Bridged Adapter&lt;br /&gt;
        (connects virtual machine directly to network card of computer)&lt;br /&gt;
&lt;br /&gt;
    ubuntu server file is already on system&lt;br /&gt;
&lt;br /&gt;
    Click on Storage&lt;br /&gt;
        click on IDE Controller / Empty&lt;br /&gt;
        click on disk on far right side (next ot IDE Secondary Master)&lt;br /&gt;
            Choose Virtual CD Disk File&lt;br /&gt;
            D:\\CNT Files\Linux Install CDs\&lt;br /&gt;
                ubuntu-10.10-server-i386.iso&lt;br /&gt;
&lt;br /&gt;
    Click Start to start the virtual machine&lt;br /&gt;
        OK through warning about keyboard capture&lt;br /&gt;
        OK through virtual colors&lt;br /&gt;
        OK through audio problems&lt;br /&gt;
        English&lt;br /&gt;
    Enter&lt;br /&gt;
    Install Ubuntu Server&lt;br /&gt;
        OK through mouse pointer&lt;br /&gt;
        OK through color&lt;br /&gt;
    Enter through English&lt;br /&gt;
    Enter through United States&lt;br /&gt;
    no for detect keyboard&lt;br /&gt;
    USA&lt;br /&gt;
    Standard USA keyboard&lt;br /&gt;
    hostname   asterisk&lt;br /&gt;
    America/Chicago time zone&lt;br /&gt;
    Guided  - use entire disk adn set up LVM&lt;br /&gt;
    Select Disk -- SCSI3&lt;br /&gt;
    select YES&lt;br /&gt;
    use default, 8.3 GB&lt;br /&gt;
    YES - Write changes to disk&lt;br /&gt;
&lt;br /&gt;
        lower corner of screen will show activity to hard disk, CD, &lt;br /&gt;
            and other devices.&lt;br /&gt;
&lt;br /&gt;
    Create User Accounts&lt;br /&gt;
        Full Name&lt;br /&gt;
        username   &lt;br /&gt;
        password:  cisco&lt;br /&gt;
               cisco&lt;br /&gt;
        Yes -- accept weak password&lt;br /&gt;
        NO  -- do not encrypt home directory&lt;br /&gt;
        empty -- no http proxy&lt;br /&gt;
&lt;br /&gt;
    NO automatic updates&lt;br /&gt;
&lt;br /&gt;
    Software to Install&lt;br /&gt;
        Leave blank&lt;br /&gt;
        TAB to reach Continue button&lt;br /&gt;
            the distribution is Oct 2010&lt;br /&gt;
            current Oct2011 server edition is the same&lt;br /&gt;
            &lt;br /&gt;
    Yes -- install GRUB boot loader to master boot record&lt;br /&gt;
&lt;br /&gt;
Remove virtual CD before&lt;br /&gt;
    Pull down Devices to --&amp;gt; CD/DVD Devices&lt;br /&gt;
&lt;br /&gt;
Login using name and password that we specified&lt;br /&gt;
&lt;br /&gt;
become administrator&lt;br /&gt;
&lt;br /&gt;
    sudo bash &lt;br /&gt;
    cisco&lt;br /&gt;
&lt;br /&gt;
    nano /etc/apt/soruces.list&lt;br /&gt;
&lt;br /&gt;
    ctrl-w&lt;br /&gt;
    ctrl-r&lt;br /&gt;
    search for us.archive.ubuntu.com&lt;br /&gt;
    replace with mirror.rit.edu&lt;br /&gt;
        In vi this is :1,$s/us.archive.ubuntu.com/mirror.rit.edu/g&lt;br /&gt;
        14 lines are changed&lt;br /&gt;
    search for security.ubuntu.com&lt;br /&gt;
    replace with mirror.rit.edu&lt;br /&gt;
        :1,$s/security.ubuntu.com/mirror.rit.edu/g&lt;br /&gt;
        6 lines change&lt;br /&gt;
    ctrl-o&lt;br /&gt;
    enter&lt;br /&gt;
    ctrl-x  to exit&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820_FA11_Schedule&amp;diff=4650</id>
		<title>Franske CNT-2820 FA11 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2820_FA11_Schedule&amp;diff=4650"/>
		<updated>2011-09-08T21:59:15Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{SyllabusInfo&lt;br /&gt;
|coursename = Information Systems Security Fundamentals&lt;br /&gt;
|coursenumber = CNT-2820&lt;br /&gt;
|numcredits = 3&lt;br /&gt;
|instructor = Dr. Ben Franske&lt;br /&gt;
|term = Fall 2011 (8/23/2011-12/15/2011)&lt;br /&gt;
|meetings = T TH 3:30pm-5:20pm&lt;br /&gt;
|location = B143&lt;br /&gt;
}}&lt;br /&gt;
This schedule provides an outline of the topics expected to be covered in this course as well as the readings and assignments due each week. Topics and readings may change in which case you will be notified in class or by e-mail and the latest version of this document is always available from the course wiki. &#039;&#039;&#039;Please have all readings completed prior to the start of each class and be prepared to take part in the discussion.&#039;&#039;&#039; Unless otherwise noted online quizzes and exams are due at 11:59pm on the date indicated.&lt;br /&gt;
&lt;br /&gt;
==Session 1: August 23==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Course Overview&lt;br /&gt;
* Introduction to Computer Security&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 2: August 25==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Challenges of Securing Information&lt;br /&gt;
* What Is Information Security?&lt;br /&gt;
* Who Are the Attackers?&lt;br /&gt;
* Attacks and Defenses&lt;br /&gt;
* Defenses Against Attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1: Introduction to Security&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 3: August 30==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Course Project Overview&lt;br /&gt;
* Wiki page creation and editing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 4: September 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Attacks Using Malware&lt;br /&gt;
* Social Engineering Attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 5: September 6==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 6: September 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Application Attacks&lt;br /&gt;
* Network Attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 7: September 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 8: September 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Vulnerability Assessment&lt;br /&gt;
* Vulnerability Scanning vs. Penetration Testing&lt;br /&gt;
* Mitigating and Deterring Attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 9: September 20==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 10: September 22==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Guest Speaker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 11: September 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Securing the Host&lt;br /&gt;
* Application Security&lt;br /&gt;
* Securing Data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 12: September 29==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 13: October 4==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Security Through Network Devices&lt;br /&gt;
* Security Through Network Technologies&lt;br /&gt;
* Security Through Network Design Elements&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 14: October 6==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 15: October 11==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Common Network Protocols&lt;br /&gt;
* Network Administration Principles&lt;br /&gt;
* Securing Network Applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 16: October 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 17: October 18==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Guest Speaker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: October 20==&lt;br /&gt;
* No IHCC classes, EdMN Conference&lt;br /&gt;
&lt;br /&gt;
==Session 18: October 25==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Wireless Attacks&lt;br /&gt;
* Vulnerabilities of IEEE 802.11 Security&lt;br /&gt;
* Wireless Security Solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 8&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Midterm Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 19: October 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 8 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 8 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 20: November 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* What Is Access Control?&lt;br /&gt;
* Implementing Access Control&lt;br /&gt;
* Authentication Services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 9&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 21: November 3==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Authentication Credentials&lt;br /&gt;
* Single Sign-On&lt;br /&gt;
* Account Management&lt;br /&gt;
* Trusted Operating Systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 10&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 9 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 22: November 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 10 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 10 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 23: November 10==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Defining Cryptography&lt;br /&gt;
* Cryptographic Hash Algorithms&lt;br /&gt;
* Using Cryptography&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 11&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 24: November 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 11 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 11 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 25: November 17==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Digital Certificates&lt;br /&gt;
* Public Key Infrastructure (PKI)&lt;br /&gt;
* Key Management&lt;br /&gt;
* Transport Encryption Algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 12&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 26: November 22==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 12 Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 12 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: November 24==&lt;br /&gt;
* No IHCC Classes, Thanksgiving&lt;br /&gt;
&lt;br /&gt;
==Session 27: November 29==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* What Is Business Continuity?&lt;br /&gt;
* Disaster Recovery&lt;br /&gt;
* Environmental Controls&lt;br /&gt;
* Incident Response Procedures&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 13&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 28: December 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Guest Speaker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 29: December 6==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Controlling Risk&lt;br /&gt;
* Reducing Risk Through Policies&lt;br /&gt;
* Awareness and Training&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 14&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 30: December 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Security+ Study Session&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==EXAM WEEK==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* CNT Projects&lt;br /&gt;
* Online Final Exam&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The instructor reserves the right to modify and adjust the schedule and assignments as needed during the course of this class. The most up to date version will always be available on the course website or from the instructor.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4642</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4642"/>
		<updated>2011-09-06T00:12:36Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: /* CNT 2820 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Router_Documentation&amp;diff=4410</id>
		<title>Cisco Router Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Router_Documentation&amp;diff=4410"/>
		<updated>2011-05-04T23:59:07Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page includes links to relevant articles on this and other sites related to routers.&lt;br /&gt;
&lt;br /&gt;
=Configuration=&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/12_4/ipv6_12_4_book.html Cisco IOS IPv6 Configuration Guide, Release 12.4]&lt;br /&gt;
&lt;br /&gt;
=Password Recovery=&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/routers/ps221/products_password_recovery09186a0080094773.shtml Cisco 1700 and 1800 Series Router Password Recovery Procedure]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/routers/ps259/products_password_recovery09186a0080094675.shtml Password Recovery Procedure for the Cisco 2600 and 2800 Series Routers]&lt;br /&gt;
&lt;br /&gt;
=IOS Software Reloading=&lt;br /&gt;
==via TFTP==&lt;br /&gt;
* [[Downloading IOS using TFTPDNLD on Cisco 1841 Router | Step by step instructions for replacing/upgrading IOS image on Cisco Routers over TFTP]]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/routers/ps259/products_tech_note09186a008015bf9e.shtml How to Download a Software Image to a Cisco 2600 via TFTP Using the tftpdnld ROMMON Command]&lt;br /&gt;
&lt;br /&gt;
==via XMODEM==&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/routers/ps259/products_tech_note09186a008015bfac.shtml Xmodem Console Download Procedure Using ROMmon for the Cisco 2600]&lt;br /&gt;
&lt;br /&gt;
=Troubleshooting=&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1915.html Troubleshooting Serial Lines on Cisco Routers]&lt;br /&gt;
=&#039;&#039;&#039;Configuration&#039;&#039;&#039;&lt;br /&gt;
  router# erase startup-config this will delete startu configurations if they were saved.&lt;br /&gt;
  router# reload This must be done last to reload the default configurations.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Cisco_Router_Documentation&amp;diff=4409</id>
		<title>Talk:Cisco Router Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Talk:Cisco_Router_Documentation&amp;diff=4409"/>
		<updated>2011-05-04T23:47:52Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Bold text&amp;#039;&amp;#039;&amp;#039;Clear configurantion flash       delete flash:&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Bold text&#039;&#039;&#039;Clear configurantion flash&lt;br /&gt;
      delete flash:&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4330</id>
		<title>Cisco Switch Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4330"/>
		<updated>2011-04-13T20:19:09Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page includes links to relevant articles on this and other sites related to switches.&lt;br /&gt;
&lt;br /&gt;
=Password Recovery=&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/switches/ps628/products_password_recovery09186a0080094184.shtml Cisco 2900XL/3500XL, 2940, 2950/2955, 2960, 2970, 3550, 3560, and 3750 Series Switch Password Recovery Procedure]&lt;br /&gt;
&lt;br /&gt;
=Authentication=&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_25_fx/configuration/guide/sw8021x.html Configuring IEEE 802.1x Port-Based Authentication on Catalyst 2960]&lt;br /&gt;
&lt;br /&gt;
=Configuration=&lt;br /&gt;
==Clearing Configurations==&lt;br /&gt;
* &#039;&#039;&#039;switch# erase startup-config&#039;&#039;&#039; This will delete startup configurations if they were saved.&lt;br /&gt;
* &#039;&#039;&#039;switch# delete flash:vlan.dat&#039;&#039;&#039; This deletes the vlan configuration. &lt;br /&gt;
* &#039;&#039;&#039;switch# reload&#039;&#039;&#039; This must be done last to reload the default configurations.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4329</id>
		<title>Cisco Switch Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4329"/>
		<updated>2011-04-13T20:16:35Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page includes links to relevant articles on this and other sites related to switches.&lt;br /&gt;
&lt;br /&gt;
=Password Recovery=&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/switches/ps628/products_password_recovery09186a0080094184.shtml Cisco 2900XL/3500XL, 2940, 2950/2955, 2960, 2970, 3550, 3560, and 3750 Series Switch Password Recovery Procedure]&lt;br /&gt;
&lt;br /&gt;
=Authentication=&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_25_fx/configuration/guide/sw8021x.html Configuring IEEE 802.1x Port-Based Authentication on Catalyst 2960]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Configuration=&lt;br /&gt;
==Clearing Configurations==&lt;br /&gt;
* &#039;&#039;&#039;switch# erase startup-config&#039;&#039;&#039; This will delete startup configurations if they were saved.&lt;br /&gt;
* &#039;&#039;&#039;switch# delete flash:vlan.dat&#039;&#039;&#039; This deletes the vlan configuration. &lt;br /&gt;
* &#039;&#039;&#039;switch# reload&#039;&#039;&#039; This must be done last to reload the default configurations.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4328</id>
		<title>Cisco Switch Documentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Switch_Documentation&amp;diff=4328"/>
		<updated>2011-04-13T20:15:49Z</updated>

		<summary type="html">&lt;p&gt;Ckherman1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page includes links to relevant articles on this and other sites related to switches.&lt;br /&gt;
&lt;br /&gt;
=Password Recovery=&lt;br /&gt;
* [http://www.cisco.com/en/US/products/hw/switches/ps628/products_password_recovery09186a0080094184.shtml Cisco 2900XL/3500XL, 2940, 2950/2955, 2960, 2970, 3550, 3560, and 3750 Series Switch Password Recovery Procedure]&lt;br /&gt;
&lt;br /&gt;
=Authentication=&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_25_fx/configuration/guide/sw8021x.html Configuring IEEE 802.1x Port-Based Authentication on Catalyst 2960]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Configuration=&lt;br /&gt;
==Clearing configurations==&lt;br /&gt;
* &#039;&#039;&#039;switch# erase startup-config&#039;&#039;&#039; This will delete startup configurations if they were saved.&lt;br /&gt;
* &#039;&#039;&#039;switch# delete flash:vlan.dat&#039;&#039;&#039; This deletes the vlan configuration. &lt;br /&gt;
* &#039;&#039;&#039;switch# reload&#039;&#039;&#039; This must be done to reload the default configurations.&lt;/div&gt;</summary>
		<author><name>Ckherman1</name></author>
	</entry>
</feed>