Franske CNT-2820: Difference between revisions

From ITCwiki
Jump to navigation Jump to search
 
(19 intermediate revisions by 2 users not shown)
Line 3: Line 3:
= General Course Information =
= General Course Information =
* [[Franske CNT-2820 Syllabus|Course Syllabus]]
* [[Franske CNT-2820 Syllabus|Course Syllabus]]
* [[Franske CNT-2820 FA10 Schedule|Fall 2010 Course Schedule]]
* [[Franske CNT-2820 FA11 Schedule|Fall 2011 Course Schedule]]
* [[Franske CNT-2820 Homework|Homework Assignments]]
* [[Franske CNT-2820 Labs-Homework|Lab and Homework Assignments]]
* [[Franske Lab Report Format|Lab Report Format]]
* [[Franske CNT Service Project Assignment|Service Project Assignment]]
* [[Franske CNT Service Project Assignment|Service Project Assignment]]


= Projects =
= Projects =
* [[Basic's of Penetration Testing]]
* [[Digital Certificates in Asymmetrical Cryptography]]


= Resources =
= Resources =
== Multimedia ==
== Multimedia ==
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]
* Security Now #195: The SSL/TLS Protocol [http://media.grc.com/sn/sn-195.mp3 Audio] @27:30 [http://www.grc.com/sn/sn-195.htm Text]
* Security Now #6: Mechanical & Electromagnetic Information Leakage [http://media.grc.com/sn/sn-006.mp3 Audio] [http://www.grc.com/sn/sn-006.htm Text]
* FM-200 Fire Suppression Demonstration [http://www.youtube.com/watch?v=0WelmCXtsyI YouTube]
* Business Continuity Site Commercial [http://www.youtube.com/watch?v=cnTfGmgmrrA YouTube]
* Explaining RAID [http://www.youtube.com/watch?v=6yDpTj2lePI YouTube]
* [http://lasecwww.epfl.ch/keyboard/ Compromising Electromagnetic Emanations of Wired and Wireless Keyboards]
* Government At Risk: Protecting Your IT Infrastructure [http://www.youtube.com/watch?v=AtNYodMaje4 YouTube]
* Disaster Recovery , Hurricane Katrina 3 of 5 - Technology conference [http://www.youtube.com/watch?v=OFHsuqTLjxA YouTube]
* EnCase Computer Forensics Demo [http://www.youtube.com/watch?v=O4ce74q2zqM YouTube]
* Computer Forensics, Evidence Acquisition [http://www.youtube.com/watch?v=9JoX4uxES7Q YouTube]
=== Wireless ===
* Security Now #10: Open Wireless Access Points [http://media.grc.com/sn/sn-010.mp3 Audio] [http://www.grc.com/sn/sn-010.htm Text]
* Security Now #11: Bad WiFi Security (WEP and MAC address filtering) [http://media.grc.com/sn/sn-011.mp3 Audio] [http://www.grc.com/sn/sn-011.htm Text]
* Security Now #13: Unbreakable WiFi Security [http://media.grc.com/sn/sn-013.mp3 Audio] [http://www.grc.com/sn/sn-013.htm Text]
* Security Now #170: The TKIP Hack [http://media.grc.com/sn/sn-170.mp3 Audio] @24:30-1:19:15 [http://www.grc.com/sn/sn-170.htm Text]
=== Cryptography ===
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]
== Web Sites ==
* [http://csrc.nist.gov/ NIST Computer Security Resource Center]
== Security Related Journal Articles ==
== Security Related Journal Articles ==
=== Finding Articles ===
=== Finding Articles ===

Latest revision as of 05:35, 20 December 2011

This is the homepage for the CNT-2820: Information Systems Security Fundamentals classes taught by Dr. Ben Franske.

General Course Information

Projects

Resources

Multimedia

Wireless

  • Security Now #10: Open Wireless Access Points Audio Text
  • Security Now #11: Bad WiFi Security (WEP and MAC address filtering) Audio Text
  • Security Now #13: Unbreakable WiFi Security Audio Text
  • Security Now #170: The TKIP Hack Audio @24:30-1:19:15 Text

Cryptography

  • Security Now Episode 35: Cryptographic Hashes Audio, Text
  • Security Now Episode 185: Cryptographic HMACs Audio, Text Content starts at 55:30
  • Security Now Episode 31: Symmetric Stream Ciphers Audio, Text
  • Security Now Episode 33: Symmetric Block Ciphers Audio, Text
  • Security Now Episode 34: Public Key Cryptography Audio, Text

Web Sites

Security Related Journal Articles

Finding Articles

Specific Journals