Monday, February 2, 2015

Teaching Presentation Information

Here is the information you need to effectively create your teaching presentations for the course.  The groups and the topics were selected during our first class.  

TEACHING PRESENTATIONS
Presentation Technical Requirements:
·         Must be 20 to 30 minutes long
·         Must include multimedia component (for example Youtube video, video you created, hands-on exercise, or game)
·         Multimedia component must be at least 2 minutes long and not longer than 15 minutes
·         Must be on the topic and include the learning objectives of the topic (see below)
·         Must include a case study or current example from the news headlines

Topics:
Topic 1: Introduction to Ethical Hacking
        Describe the role of an ethical hacker
        Describe what you can do legally as an ethical hacker
        Describe what you can’t do as an ethical hacker

Topic 2: TCP/IP Concepts Review
        Describe the TCP/IP protocol stack
        Explain the basic concepts of IP addressing
        Explain the binary, octal, and hexadecimal numbering systems

Topic 3: Network and Computer Attacks
        Describe the different types of malicious software and what damage they can do
        Describe methods of protecting against malware attacks
        Describe the types of network attacks
        Identify physical security attacks and vulnerabilities

Topic 4: Footprinting and Social Engineering
        Use Web tools for footprinting
        Conduct competitive intelligence
        Describe DNS zone transfers
        Identify the types of social engineering

Topic 5: Port Scanning
        Describe port scanning and types of port scans
        Describe port-scanning tools
        Explain what ping sweeps are used for
        Explain how shell scripting is used to automate security tasks

Topic 6: Enumeration
        Describe the enumeration step of security testing
        Enumerate Windows OS targets
        Enumerate NetWare OS targets
        Enumerate *nix OS targets

Topic 7: Programming for Security Professionals
        Explain basic programming concepts
        Write a simple C program
        Explain how Web pages are created with HTML
        Describe and create basic Perl programs
        Explain basic object-oriented programming concepts

Topic 8: Desktop and OS Vulnerabilities
        Describe vulnerabilities of Windows and Linux operating systems
        Identify specific vulnerabilities and explain ways to fix them
        Explain techniques to harden systems against Windows and Linux vulnerabilities

Topic 9: Embedded Operating Systems
        Explain what embedded operating systems are and where they’re used
        Describe Windows and other embedded operating systems
        Identify vulnerabilities of embedded operating systems and best practices for protecting them
Topic 10: Hacking Web Servers
        Describe Web applications
        Explain Web application vulnerabilities
        Describe the tools used to attack Web servers

Topic 11: Hacking Wireless Networks
        Explain wireless technology
        Describe wireless networking standards
        Describe the process of authentication
        Describe wardriving
        Describe wireless hacking and tools used by hackers and security professionals

Topic 12: Cryptography
        Summarize the history and principles of cryptography
        Describe symmetric and asymmetric encryption algorithms
        Explain public key infrastructure (PKI)
        Describe possible attacks on cryptosystems

Topic 13: Network Protection Systems
        Explain how routers are used as network protection systems
        Describe firewall technology and tools for configuring firewalls and routers
        Describe intrusion detection and prevention systems and Web-filtering technology
        Explain the purpose of honeypots 

Due to the weather, we are one week behind at this point.  The first presentation will be made by me tomorrow provided the college is open and running and we are able to hold class.  This will serve as a model for what I am looking for you to do.  

The presentation on topic 2 will be made next week, so please be prepared.  The schedule for the remaining presentations will appear in a separate post later this week.

No comments:

Post a Comment