IFSM 430

Syllabus

Paper topics


Pipkin

Preface Prologue Introduction
Reaction
Inspection
Chapter 21 Response plan
Chapter 1 Resource Inventory
Chapter 22 Incident determination
Chapter 2 Threat Assessment
Chapter 23 Incident notification
Chapter 3 Loss Analysis
Chapter 24 Incident containment
Chapter 4 Vulnerabilities
Chapter 25 Assessing the damage
Chapter 5 Safeguards
Chapter 26 Incident recovery
Chapter 6 Current Status
Chapter 27 Automated response
Protection
Reflection
Chapter 7 Awareness
Chapter 28 Incident documentation
Chapter 8 Access
Chapter 29 Incident evaluation
Chapter 9 Identification
Chapter 30 Public relations
Chapter 10 Authentication
Chapter 31 Legal prosecution
Chapter 11 Authorization
Chapter 12 Availability
Chapter 13 Accuracy
Chapter 14 Confidentiality
Chapter 15 Accountability
Chapter 16 Administration
Detection
Chapter 17 Intruder types
Chapter 18 Intrusion methods
Chapter 19 Intrusion process
Chapter 20 Detection methods

Lab exercises

TCP/IP stuff
CERT, grc, ftp, zonealarm
checksum, certificates, scan, encryption etc.
Cuckoo's Egg stuff. Encryption
File permissions. X
XP processes, registry, remote connection.

Security glossaries

RFC2828 Internet Security Glossary
SANS glossary
Slade's glossary
RFC2196 Site Security Handbook
CyberProtect diagram

Security certifications

Security+
CIW Security
SANS GIAC
CISSP

Linux Security HOWTO:
Umask
File permissions
Password Security
Shadow
Crack

Not your Mother's virus. Grimes
MS Contagion. Spafford
Process of Security. Schneier
Check list
Back Orifice. CERT
By popular class demand, here's the link to CDC's BO2K:
Enjoy! bo2k.com

Zone Alarm 1.7MB


Lab exercises

Unix passwords etc
Firewall
PGP
Internet ping, finger, traceroute, scan