Wednesday, February 18, 2009

UNIT 10 – Protecting Networks with Security Devices

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook –
Chapter 13, pp. 321–346 Quiz

Assignments:
Review Questions (RQ):
Chapter 13, pp. 347–349

Hard Drives Required for LAB.

Project Part 2
Use Internet resources to footprint fazzle.com.
Due Week 10.

Lab(s):
LAB 1:
CREATING STANDARD AND EXTENDED IP ACCESS LISTS
Complete Activity 13-2, Chapter 13, pp.329 from your textbook Hands-On Ethical Hacking and
Network Defense.

Deliverables:
Submit your work in a Word document via hardcopy and email to your instructor.

LAB 2: EXAMINING AN OPEN-SOURCE HONEYPOT
Complete Activity 13-4, Chapter 13, pp.345 from your textbook Hands-On Ethical Hacking and Network Defense.

Document you activity via screenshots inserted into a Word document.
Visit http://www.securityfocus.com/infocus/1659
Answer the following questions:
1. What is a Honeypot?
2. What do the following commands do:arpd 192.168.1.0/24
honeyd -p nmap.prints -f honeyd.conf 192.168.1.0/24

Submit your work in a Word document via hardcopy and email to your instructor.

Deliverables and format: Assignment due at the end of class.
Submit your answers in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Submit each assignment type as a separate attachment (CA1, LABs, RQ)


Refer to General Course Information for Email and Assignment Instructions.

Wednesday, February 4, 2009

UNIT 9 – Hacking Wireless Networks

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook –
Chapter 11, pages 269–289 Quiz

Assignments:
Review Questions (RQ):
Chapter 11, pp. 290–292

Hard Drives Required for LAB.

Project
Project Part 1 Submission
Project Part 2 - Use Internet resources to footprint fazzle.com.
Assigned Week 9 & Submission Due Week 10.

Lab(s):
LAB 1: INSTALLING NETSTUMBLER
Perform activity 11-3, pp.285 of your textbook Hands-On Ethical Hacking and Network Defense. After completing the activity, answer the following questions:
1. Based on the information about wireless networks, what can you conclude about the security of the wireless networks within your sensing area?
2. Which tools can you use to break the security of a wireless network?

Evaluation Criteria:
1. Did the students differentiate secured from unsecured networks?
2. Did the students mention Web Cracking Tools or other wireless sniffers?

Lab 2: Attacking the target server.
Based upon last week’s lab, write a report listing the tools you evaluated against the target server.
How did the tools perform?
What information were you able to gather regarding the target server?
What tools (based upon the tools you used) would you want in your tool kit to perform penetration testing?

Deliverables and format: Assignment due at the end of class.
Submit your answer in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Submit each assignment type as a separate attachment (CA1, LABs, RQ)


Refer to General Course Information for Email and Assignment Instructions.

IS317 UNIT 8 – Hacking Web Severs

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook –
Chapter 10, pp. 231–264

Assignments:
Review Questions (RQ):
Chapter 10, pp. 265–266

Hard Drives Required for LAB.

Lab(s):
LAB 1:
VISITING THE OWASP WEB SITE
Complete activity 10-5, pp.250 of your textbook.
Based on your review of the top 10 vulnerabilities, do you believe it is possible to secure a Web site? Substantiate your opinion. What are some of the considerations a network security professional must take into account for securing a Web site?

Evaluation Criteria:
1. Did the students explain whether it is possible to secure a Web site?
2. Do the students list the key elements involved in Web server security?

Deliverables and format: Assignment due at the end of class.
Submit your answer in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Case Assignment 1 (CA1)
Title:
Determining Vulnerabilities of Web Servers
Complete the exercise Case 10-1 on page 267 from Chapter 10 of your textbook. To understand the scenario for this exercise, read case 1-1 on page 17 of the textbook.

Deliverables and format:

Submit your answer in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Submit each assignment type as a separate attachment (CA1, LABs, RQ)

IS317 Course Project
Project Introduction: Using commonly available tools examine the Internet Footprint of a company and identify possible vectors a hacker might attempt to compromise.

Project Submission Plan:
Project Part I
Tasks:
1. Using Google and Yahoo, determine all the information about the search engine—Fazzle.com, including details of ownership, board members, and other possible areas of inspection.

Deliverables and format:
Submit your answer in a Word document in not more than 200 words.
Font: Arial; 11
Line Spacing: Double

Assigned and Due Date:
Assigned: Week 8
Due: Week 9
Grading Weight: 5%

Project Part 2
Tasks:
1. Using www.netcraft.com and
www.whois.com, define IP blocks and OS systems for the site Fazzle.com.

Deliverables and format:
Submit your answer in a Word document in not more than 100 words.
Font: Arial; 11
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 9
Due: Week 10
Grading Weight: 10%



Refer to General Course Information for Email and Assignment Instructions.