TEACHING PRESENTATIONS
Presentation
Technical Requirements:
·
Must be 20 to 30 minutes long
·
Must include multimedia component (for example
Youtube video, video you created, hands-on exercise, or game)
·
Multimedia component must be at least 2 minutes long
and not longer than 15 minutes
·
Must be on the topic and include the learning
objectives of the topic (see below)
·
Must include a case study or current example
from the news headlines
Topics:
Topic 1: Introduction to Ethical Hacking
–
Describe the role of an ethical hacker
–
Describe what you can do legally as an ethical
hacker
–
Describe what you can’t do as an ethical hacker
Topic 2: TCP/IP Concepts Review
–
Describe the TCP/IP protocol stack
–
Explain the basic concepts of IP addressing
–
Explain the binary, octal, and hexadecimal
numbering systems
Topic 3: Network and Computer Attacks
–
Describe the different types of malicious
software and what damage they can do
–
Describe methods of protecting against malware
attacks
–
Describe the types of network attacks
–
Identify physical security attacks and
vulnerabilities
Topic 4: Footprinting and Social Engineering
–
Use Web tools for footprinting
–
Conduct competitive intelligence
–
Describe DNS zone transfers
–
Identify the types of social engineering
Topic 5: Port Scanning
–
Describe port scanning and types of port scans
–
Describe port-scanning tools
–
Explain what ping sweeps are used for
–
Explain how shell scripting is used to automate
security tasks
Topic 6: Enumeration
–
Describe the enumeration step of security
testing
–
Enumerate Windows OS targets
–
Enumerate NetWare OS targets
–
Enumerate *nix OS targets
Topic 7: Programming for Security Professionals
–
Explain basic programming concepts
–
Write a simple C program
–
Explain how Web pages are created with HTML
–
Describe and create basic Perl programs
–
Explain basic object-oriented programming
concepts
Topic 8: Desktop and OS Vulnerabilities
–
Describe vulnerabilities of Windows and Linux
operating systems
–
Identify specific vulnerabilities and explain
ways to fix them
–
Explain techniques to harden systems against
Windows and Linux vulnerabilities
Topic 9: Embedded Operating Systems
–
Explain what embedded operating systems are and
where they’re used
–
Describe Windows and other embedded operating
systems
–
Identify vulnerabilities of embedded operating
systems and best practices for protecting them
Topic 10: Hacking Web Servers
–
Describe Web applications
–
Explain Web application vulnerabilities
–
Describe the tools used to attack Web servers
Topic 11: Hacking Wireless Networks
–
Explain wireless technology
–
Describe wireless networking standards
–
Describe the process of authentication
–
Describe wardriving
–
Describe wireless hacking and tools used by
hackers and security professionals
Topic 12: Cryptography
–
Summarize the history and principles of
cryptography
–
Describe symmetric and asymmetric encryption
algorithms
–
Explain public key infrastructure (PKI)
–
Describe possible attacks on cryptosystems
Topic 13: Network Protection Systems
–
Explain how routers are used as network
protection systems
–
Describe firewall technology and tools for
configuring firewalls and routers
–
Describe intrusion detection and prevention
systems and Web-filtering technology
–
Explain the purpose of honeypots
Due to the weather, we are one week behind at this point. The first presentation will be made by me tomorrow provided the college is open and running and we are able to hold class. This will serve as a model for what I am looking for you to do.
The presentation on topic 2 will be made next week, so please be prepared. The schedule for the remaining presentations will appear in a separate post later this week.
No comments:
Post a Comment