Franske CNT-2820: Difference between revisions
Jump to navigation
Jump to search
BenFranske (talk | contribs) |
BenFranske (talk | contribs) |
||
(18 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
= General Course Information = | = General Course Information = | ||
* [[Franske CNT-2820 Syllabus|Course Syllabus]] | * [[Franske CNT-2820 Syllabus|Course Syllabus]] | ||
* [[Franske CNT-2820 | * [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]] | ||
* [[Franske CNT-2820 Homework|Homework Assignments]] | * [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]] | ||
* [[Franske Lab Report Format|Lab Report Format]] | |||
* [[Franske CNT Service Project Assignment|Service Project Assignment]] | * [[Franske CNT Service Project Assignment|Service Project Assignment]] | ||
= Projects = | = Projects = | ||
* [[Basic's of Penetration Testing]] | |||
* [[Digital Certificates in Asymmetrical Cryptography]] | |||
= Resources = | = Resources = | ||
Line 16: | Line 19: | ||
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube] | * Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube] | ||
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube] | * Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube] | ||
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards] | |||
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube] | |||
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube] | |||
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube] | |||
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube] | |||
=== Wireless === | |||
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text] | |||
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text] | |||
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text] | |||
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text] | |||
=== Cryptography === | |||
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text] | |||
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30 | |||
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text] | |||
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text] | |||
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text] | |||
== Web Sites == | |||
* [http://csrc.nist.gov/ NIST Computer Security Resource Center] | |||
== Security Related Journal Articles == | == Security Related Journal Articles == |
Latest revision as of 05:35, 20 December 2011
This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.
General Course Information
- Course Syllabus
- Fall 2011 Course Schedule
- Lab and Homework Assignments
- Lab Report Format
- Service Project Assignment
Projects
Resources
Multimedia
- Security Now #195: The SSL/TLS Protocol Audio @27:30 Text
- Security Now #6: Mechanical & Electromagnetic Information Leakage Audio Text
- FM-200 Fire Suppression Demonstration YouTube
- Business Continuity Site Commercial YouTube
- Explaining RAID YouTube
- Compromising Electromagnetic Emanations of Wired and Wireless Keyboards
- Government At Risk: Protecting Your IT Infrastructure YouTube
- Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference YouTube
- EnCase Computer Forensics Demo YouTube
- Computer Forensics, Evidence Acquisition YouTube
Wireless
- Security Now #10: Open Wireless Access Points Audio Text
- Security Now #11: Bad WiFi Security (WEP and MAC address filtering) Audio Text
- Security Now #13: Unbreakable WiFi Security Audio Text
- Security Now #170: The TKIP Hack Audio @24:30-1:19:15 Text
Cryptography
- Security Now Episode 35: Cryptographic Hashes Audio, Text
- Security Now Episode 185: Cryptographic HMACs Audio, Text Content starts at 55:30
- Security Now Episode 31: Symmetric Stream Ciphers Audio, Text
- Security Now Episode 33: Symmetric Block Ciphers Audio, Text
- Security Now Episode 34: Public Key Cryptography Audio, Text
Web Sites
Security Related Journal Articles
Finding Articles
- Open J-Gate
- Directory of Open Access Journals
- Google Scholar - Note this may include links to non-free articles