Department of Engineering Technology College of Engineering University of Central Florida Dr. Philip Craiger

Size: px
Start display at page:

Download "Department of Engineering Technology College of Engineering University of Central Florida Dr. Philip Craiger"

Transcription

1 Department of Engineering Technology College of Engineering University of Central Florida Dr. Philip Craiger Title: Course Description: Prerequisites: Incident Response Technologies CIS 6395 Covers security incidents and intrusions, including identifying and categorizing incidents; responding to incidents; log analysis; network traffic analysis; tools; and creating an incident response team. PR: CGS 5131 or CI. PROFESSOR Dr. Philip Craiger, CISSP Department of Engineering Technology & Assistant Director for Digital Evidence National Center for Forensic Science WebCourses ONLY Office: NCFS (Partnership Building 1) 225 Voice: (best to reach me via , leave your phone number if you need to talk to me). Office hours by appointment only Course Goals : By the end of the course a student should be able to : 1. Detect and characterize various incident types 2. Demonstrate a practical understanding of the analysis of artifacts left on a compromised system 3. Demonstrate an understanding of the complexity of and effectively respond to privileged and major event incidents. 4. Obtain practical experience in the analysis of vulnerabilities and the coordination of vulnerability handling tasks 5. Formulate effective advisories, alerts, and management briefings COURSE DELIVERY We will use both Webcourses and a wiki for this class. The primary course site is:

2 This site has links to all course materials (video lectures, textbook, required readings, etc.). We will use Webcourses for the following: 1. Discussion group postings 2. Class 3. Assignment turn in 4. Class announcements Video Lectures All lectures are delivered through video. Lectures are available in a downloadable compressed file. Uncompress the file creates a directory with the same name as the compressed file. Go to that directory and clink on the 'index.htm' file. That will bring up your browser and video will play within it. Note the format is Flash, so you must have Flash Player installed in order to view the videos. (Google for 'flash player', and the first link should be the one to download Flash Player). The videos vary from minutes in length. (Any longer than that and I lose your attention!). I am really big on demonstrating what I'm talking about, so generally I'll discuss a topic using PowerPoint slides, and then move on over to a window that has Linux running in it (see under Course Equipment how I do this), and then demonstrate what I've discussed. Course Outline : 1. Introduction to incident and intrusion handling a. Definition of incident b. Criteria for incidents c. Categories of incidents d. Types of incidents e. Response level to incidents 2. Definition of incident handling a. Purpose of incident handling b. Steps in incident handling 3. Network forensics a. TCP/IP b. Scanning/reconnaissance c. Trace evidence 4. Technical Analysis a. Log Analysis b. Configuration files c. Network Traffic analysis 5. System Devices

3 a. Windows servers b. Mac OS X servers c. Unix servers 6. Malware analysis 7. Creating a CIRT 8. Common problems a. CIRT component & constituency 9. Policies & Procedure a. Standard Operating Procedure (SOP) 10. Case Studies Textbook: Required: Grance, T., Kent, K., & Kim, B. (2004). Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology. West-Brown, M.J., Stikvoort, D., & Kossakowski, K. (2003). Handbook for Computer Security Incident Response Teams (CSIRTs). Computer Emergency Response Team, Carnegie- Mellon University. These are free textbooks that I ve uploaded on the website. There are additional readings as well. Why do I use a free textbook you ask? 1. It has the same materials as the $120 textbooks (pretty much), and 2. I'm trying to be nice to hardworking, poor students. Contacting Me The best way to contact me depends on whether it's class or personal related. IF your question is class related and you need an answer from ME, THEN post to the "Ask the Professor" Discussion Group on WebCourses. (Why? Becuse if you have a question, odds are 5 others have the same question. It's more efficient to answer one discussion posting than 6 s). IF your question is related to a PERSONAL matter, THEN me through WebCourses. (If you me about a class-related matter, I will reply "Post this to the Ask the Prof Discussion Group." You've been warned).

4 STUDENT PRODUCTS Products include: assignments to include; analyzing and correlating log files from multiple devices to determine incident source; demonstration of procedures to recover from various incidents on various operating systems and platforms; gathering and analyzing trace evidence from an incident; create timeline. Professionally written reports are required for each assignment. Students must be able to demonstrate effective communication skills in order to pass this course. COURSE EQUIPMENT You will need access to Linux. You have several options: o (EASIEST) Download VMWare Player Player: AND o Download an Ubuntu appliance o OR o o OR o A computer that dual booted Windows (98/NT/2000/XP) and a distribution of Linux (it doesn't matter which distribution). WARNING: You can severely and irreparably hose your Windows installation! So unless you really know what you are doing, I would not suggest this option. There is a lot more information on the wiki about this. \My (strong) suggestion is download VMWare Player and a Linux appliance. (See the video VMWare Howto for more specifics regarding running VMWare player.) A Linux appliance is simply a Linux Virtual Machine, pre-made, that will run in VMWare Player. If you choose the second option, be forewarned that you should have a complete backup of your system, as it s very easy to hose your system. Unless you have created a dual-boot system previously, I would suggest going with the first option. EVALUATION Assignments are graded on the following factors: o Technical accuracy o Completeness o Professionalism The quality of communicating your ideas THIS IS CRITICAL. The overall appearance of your document

5 Grading Scale = A = B = C = D Below 60 is an F TESTS There are none. ASSIGNMENTS All assignments are individual assignments, not group work. Late assignments will NOT be accepted Assignments sent to me in any other means that WebCourses upload will NOT be accepted. Unless otherwise stated, all assignments are due no later than 11:55PM (Eastern) on the due date. Every assignment must be named in the following format: <first name>.<last name>.<assignment number>.[txt,doc] (whichever extension I request) Failure to follow this rule will result in a 25% reduction in your grade (that is, you start off with a 75). Plagiarizing someone s work will in an F for the course. If you are unsure of the meaning of plagiarism, I suggest you read: If you use someone else's words, then reference where you obtained the information. There is nothing wrong in doing this. However, it is wrong to use someone else's work without giving them credit. NETIQUETTE Use appropriate netiquette when posting to the discussion group. No flames please. Try to be helpful. At one time or another in our lives we were clueless (some more than others). DISCUSSION GROUPS

6 General Discussion for communication between/amongst students about any topic Ask the Professor for questions for me about the course, forensics, any class-related topic. ADDENDUM I reserve the right to change the syllabus or content of this course in order to provide a better quality educational product.

Enabling Security Operations with RSA envision. August, 2009

Enabling Security Operations with RSA envision. August, 2009 Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If

More information

CST 244 Computer Forensics and Investigation Spring, 2010

CST 244 Computer Forensics and Investigation Spring, 2010 CST 244 Computer Forensics and Investigation Spring, 2010 Instructor: Guy Theriault Class Room: 221 Office: Rm 221 Class Hours: Mon thru Fri 8:00 to 10:50 Class Dates: Mar 8 to Apr 16 Office hours: Monday,

More information

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security+ P a g e 1 of 5. 5-Day Instructor Led Course P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic

More information

Online Basic Statistics

Online Basic Statistics Online Basic Statistics Madison Area Technical College Fall 2013 Syllabus Course Information Catalog Number: 20-804-240 Class Number: 33342 Dates: 10/21/2013-12/20/2013 Credits: 4 Website: http://blackboard.madisoncollege.edu

More information

Division of Fine Arts Department of Photography Course Syllabus

Division of Fine Arts Department of Photography Course Syllabus Division of Fine Arts Department of Photography Course Syllabus COURSE TITLE COURSE NUMBER PREREQUISITES Digital Camera Work CRN 10097 PGY 1800C None CREDIT HOURS 3.0 CONTACT HOURS 45 hours online CLASS

More information

Class Wiki: http://soloway.pbworks.com/w/page/45158676/441%20course

Class Wiki: http://soloway.pbworks.com/w/page/45158676/441%20course 9/7/2015 Page 1 of 5 Syllabus TITLE: Mobile App Development for Entrepreneurs CSE 441 Fall 2015 Section 1: 3:00-4:30pm, 1121 LBME Section 2: 4:30-6:00pm, 1121 LBME Best practices in the software engineering

More information

ELEN 115 Computer Components and Peripherals

ELEN 115 Computer Components and Peripherals Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: pashman@okanagan.bc.ca

More information

How to Restore a Windows System to Bare Metal

How to Restore a Windows System to Bare Metal How to Restore a Windows System to Bare Metal This article applies to Barracuda Backup Server firmware version 5.4 and higher. Bare metal recovery allows you to restore a complete Microsoft Windows system,

More information

QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209

QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209 QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209 Rajesh Srivastava, Ph.D. Professor and Chair, Department of Information Systems and Operations Management Lutgert

More information

QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209

QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209 QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209 Elias T. Kirche, Ph.D. Associate Professor Department of Information Systems and Operations Management Lutgert

More information

MIS 5208 Data Analytics for IT Auditors Introduction & Course Overview

MIS 5208 Data Analytics for IT Auditors Introduction & Course Overview MIS 5208 Data Analytics for IT Auditors Introduction & Course Overview Week 1: Introductions, Course Outline, Reading, Tools and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Prerequisites: Basic

More information

Penetration Testing Walkthrough

Penetration Testing Walkthrough Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science jddevaughn@cs.umass.edu 1 Reminders After

More information

Political Science 1336 American Government I U.S. and Texas Constitutions and Politics FALL 2009

Political Science 1336 American Government I U.S. and Texas Constitutions and Politics FALL 2009 Political Science 1336 American Government I U.S. and Texas Constitutions and Politics FALL 2009 Class Number 30485 Online Distance Education Section 1 COURSE DESIGN Welcome to POLS1336 30485! This is

More information

Statistical Methods Online Course Syllabus

Statistical Methods Online Course Syllabus VALENCIA COLLEGE EAST CAMPUS STA 2023 STATISTICAL METHODS (ONLINE COURSE) SYLLABUS Term/Year: Fall 2011 CRN: 11563/11615/13231/11839 Professor: Dr. Agatha Shaw E-mail: Blackboard Course E-Mail or ashaw17@mail.valenciaccollege.edu

More information

CIS 156. Firewalls and Intrusion Detection

CIS 156. Firewalls and Intrusion Detection CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal

More information

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS SPRING 2016 PROFESSOR INFORMATION: Name: Dr. Ron C. Darnell Phone Number: 972-279-6511 ext. 152 (Use Amberton ext. #) Email

More information

Course Description. Prerequisites. CS-119/119L, Section 0137/0138 Course Syllabus Program Design & Development - Fall 2015

Course Description. Prerequisites. CS-119/119L, Section 0137/0138 Course Syllabus Program Design & Development - Fall 2015 CS-119/119L, Section 0137/0138 Course Syllabus Program Design & Development - Fall 2015 Course Description CS-119 Section 0137 Hybrid course (Classroom/web) 3 Units CS-119L Lab section 0138 1 Unit (You

More information

User Manual. User Manual Version 4.0.0.0

User Manual. User Manual Version 4.0.0.0 User Manual User Manual Version 4.0.0.0 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...

More information

Thursday 11:00 a.m. - 12:00 p.m. and by appointment

Thursday 11:00 a.m. - 12:00 p.m. and by appointment Instructor Information Instructor: CIS 4: Introduction to Computers, Business Applications Gina Jerry Phone: 310-434-4686 E-mail: Website: Course Website: Office: Office Hours: Course Description jerry_gina@smc.edu

More information

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By:

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By: Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer By: Senior Special Agent Ernest Baca United States Customs Service Office of Investigations Resident Agent in

More information

idatafax Troubleshooting

idatafax Troubleshooting idatafax Troubleshooting About idatafax idatafax is a client application that connects back to a server at the PHRI based in Hamilton, Ontario, Canada. It is not known to interfere with any software and

More information

New York City College of Technology Computer Systems Technology Department

New York City College of Technology Computer Systems Technology Department New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual

More information

Security and Computer Forensics ITP 477 (4 Units)

Security and Computer Forensics ITP 477 (4 Units) Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,

More information

CSE 265: System and Network Administration. CSE 265: System and Network Administration

CSE 265: System and Network Administration. CSE 265: System and Network Administration CSE 265: System and Network Administration WF 9:10-10:00am Packard 258 M 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:

More information

Florida National University Online Courses Platform

Florida National University Online Courses Platform Florida National University Online Courses Platform Created by the Online Learning Dept. September, 2013 * Blackboard System Requirements Accessing Blackboard Logging Into Blackboard Global Navigation

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Free Dynamic DNS account you can use one of your choosing I like DynDNS but there's also No-IP and probably others.

Free Dynamic DNS account you can use one of your choosing I like DynDNS but there's also No-IP and probably others. 1 of 7 3/26/2009 2:01 PM The 'Point and Click' Home VPN HowTo Guide contact: beakmyn frontiernet net The 'Point and Click' Home VPN HowTo Guide by beakmyn is licensed under a Creative Commons

More information

CSE 265: System and Network Administration. CSE 265: System and Network Administration

CSE 265: System and Network Administration. CSE 265: System and Network Administration CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:

More information

PC Applications IT102 estart Spring 2014

PC Applications IT102 estart Spring 2014 PC Applications IT102 estart Spring 2014 3 credits No prerequisites Instructor Information Debbi Remillard, IT Department NHTI full time faculty member for 16 years as PC Applications Coordinator Email

More information

Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients.

Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients. Android: Setup Hello, World: Android Edition due by noon ET on Wed 2/22 Ingredients. Android Development Tools Plugin for Eclipse Android Software Development Kit Eclipse Java Help. Help is available throughout

More information

SUREedge Software Appliance (vmware) Installation Guide

SUREedge Software Appliance (vmware) Installation Guide SUREedge Software Appliance (vmware) Installation Guide Thank you for choosing SUREedge This guide describes the procedure to obtain and install SUREedge software appliance on a vmware server. The steps

More information

EQSC 240/L INTRODUCTION TO EQUINE SCIENCE

EQSC 240/L INTRODUCTION TO EQUINE SCIENCE EQSC 240/L INTRODUCTION TO EQUINE SCIENCE Instructor: Petra Collyer DVM PhD Office Location: AGIT 229 Office Hours: by appointment Office Phone: 903-886-5355 Office Fax: 903-866-5990 Email Address and

More information

BUS 059 (62Z) - Niedermier, 15F

BUS 059 (62Z) - Niedermier, 15F BUS 059 (62Z) - Niedermier, 15F BUS 59 Syllabus- CRN 22407 Business 59 Promoting Your Business with Social Media Course Overview and Syllabus Fall 2015 / 5 Units OFFICE HOUR ONLINE - TUES - 2:00PM - 3:00PM

More information

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Instructor Chuan Yue Email cyue@uccs.edu Phone 719-255-5155 Course Day & Time Tuesday, Thursday

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration MW 1:10-2:00pm Maginnes 105 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor: Prof. Brian D. Davison

More information

NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290

NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290 NORTH DAKOTA CLASS DESCRIPTION ND Human Resource Management Services Phone: (701) 328-3290 Class Code(s): 0117 0118 SCOPE OF WORK: INFORMATION SYSTEMS SECURITY ANALYST Work involves the completion of technical

More information

Discrete Mathematics I Distance Learning (online) sections

Discrete Mathematics I Distance Learning (online) sections FLORIDA STATE UNIVERSITY MAD 2104 Discrete Mathematics I Distance Learning (online) sections Summer 2014 https:/ /campus.fsu.edu Florida State University Tallahassee, Florida 32306 Copyright 2014 Florida

More information

MATH 205 STATISTICAL METHODS

MATH 205 STATISTICAL METHODS Syllabus Objective MATH 205 STATISTICAL METHODS Course Syllabus The purpose of this syllabus is to guide the participant in the requirements, demands, logistics and expectations of this course. Getting

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance NUIT Tech Talk Peeking Behind the Curtain of Security Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance Definitions Malware: The Virus/Trojan software we ve all come

More information

This manual provides information and recommendations for Mac SharePoint Users at Fermilab. Using SharePoint from a Mac: Overview

This manual provides information and recommendations for Mac SharePoint Users at Fermilab. Using SharePoint from a Mac: Overview Using SharePoint from a Mac: Overview This manual provides information and recommendations for Mac SharePoint Users at Fermilab. Page 0 Contents Introduction...2 Getting Started...2 SharePoint Username

More information

DISTANCE EDUCATION GGS 315: GEOGRAPHY OF THE UNITED STATES. Fall Semester 2015

DISTANCE EDUCATION GGS 315: GEOGRAPHY OF THE UNITED STATES. Fall Semester 2015 1 DISTANCE EDUCATION GGS 315: GEOGRAPHY OF THE UNITED STATES Fall Semester 2015 Contents Faculty 1 Honor Code: 1 Content: 2 Course Prerequisites: 2 Learning Outcomes: 2 Online Learning Community: 2 Recommended

More information

Borough of Manhattan Community College Department of Social Science. POL 100-036 American Government Spring 2014

Borough of Manhattan Community College Department of Social Science. POL 100-036 American Government Spring 2014 Borough of Manhattan Community College Department of Social Science POL 100-036 American Government Spring 2014 Online 3 credits Prof. Melissa T. Brown mbrown@bmcc.cuny.edu Office: N-669 Office Phone:

More information

Introduction to Business Course Syllabus. Dr. Michelle Choate Office # C221 Phone: 305-809-3202 Mobile Office: 828-329-2157

Introduction to Business Course Syllabus. Dr. Michelle Choate Office # C221 Phone: 305-809-3202 Mobile Office: 828-329-2157 Introduction to Business Course Syllabus COURSE TITLE Introduction to Business COURSE NUMBER GEB 1011 (11137) PREREQUISITES None CREDIT HOURS 3 CONTACT HOURS 45 CLASS MEETING TIMES CLASS METHOD Virtual

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

Virtual machine W4M- Galaxy: Installation guide

Virtual machine W4M- Galaxy: Installation guide Virtual machine W4M- Galaxy: Installation guide Christophe Duperier August, 6 th 2014 v03 This document describes the installation procedure and the functionalities provided by the W4M- Galaxy virtual

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment

More information

Click the "Connect" button. You should now see the following screen:

Click the Connect button. You should now see the following screen: QUICK FTP TUTORIAL FTP stands for File Transfer Protocol. As you might guess from the name, FTP allows you to download and upload files from one computer to another across a network. The easiest way to

More information

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu COURSE TITLE: COURSE NUMBER: Introduction to Server and Network Security CIS 1352 COURSE DESCRIPTION (with prerequisites): This course

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION PROFESSOR INFORMATION

COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION PROFESSOR INFORMATION COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION COURSE DETAIL COURSE CALENDAR GENERAL INFORMATION PROFESSOR INFORMATION Instructor: Timothy Walker Phone/Text:

More information

EPI 820/CPH504: Epidemiology in Public Health (Online)

EPI 820/CPH504: Epidemiology in Public Health (Online) EPI 820/CPH504: Epidemiology in Public Health (Online) Course Description Spring Semester 2013 3 credits COURSE SYLLABUS This course provides an opportunity for graduate and professional students and fellows

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same Working from Home Tools and Technologies for Improving Your Programming Environment Daniel J. Hood danielhood@umbc.edu Overview Tools for MS Windows (and others OSs) SSH SCP X Windows Tunneling X Connections

More information

General Psychology PSY110 Winter Session 2011

General Psychology PSY110 Winter Session 2011 General Psychology PSY110 Winter Session 2011 Professor Robin Nemeroff E-mail: NemeroffR@wpunj.edu Office: 415 Hamburg Turnpike Virtual Office Hours: Tuesdays and Thursdays from 2-3PM and by appointment

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

Remote Unix Lab Environment (RULE)

Remote Unix Lab Environment (RULE) Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

Incident Response. Information Security Incident. Georgia State University

Incident Response. Information Security Incident. Georgia State University Right of Left of Right of Response Indications & Warnings Prevent Contain, Recover, Harden Richard Baskerville Threat Information System Detect Respond Deter Georgia State University Legislate & Policy

More information

Mac Client Installation Notes

Mac Client Installation Notes Mac Client Installation Notes Important Note Please note that Java no longer ships with MAC OS X 10.7 (Lion) and you will need to download and install Java before installing the Attix5 Pro MAC Backup Client

More information

Security Policy for External Customers

Security Policy for External Customers 1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration

More information

1. ASSETT Survey: What technology do you like your classes to use?

1. ASSETT Survey: What technology do you like your classes to use? 1. ASSETT Survey: What technology do you like your classes to use? This survey:... asks a little about you... gives a list of technologies a classroom might have. You tell us which you think are important.

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS FALL 2015 PROFESSOR INFORMATION: Name: Ron C. Darnell, MBA, PMP, PMI-ACP, CSM Phone Number: 972/279-6511 ext. 152 Email

More information

Getting credit for completing this lab

Getting credit for completing this lab Lab Exercise: Introduction to Microsoft SharePoint The purpose of this lab is to give you an introduction to Microsoft SharePoint, a team collaboration software technology. As the use of SharePoint grows

More information

POFT 1309 Administrative Office Procedures I COURSE SYLLABUS

POFT 1309 Administrative Office Procedures I COURSE SYLLABUS POFT 1309 Administrative Office Procedures I COURSE SYLLABUS COURSE NUMBER AND TITLE: POFT 1309 Administrative Office Procedures I (Online Lecture Course) COURSE (CATALOG) DESCRIPTION: Study of current

More information

Tivoli Enterprise Monitoring Server "HOT" backup

Tivoli Enterprise Monitoring Server HOT backup Tivoli Enterprise Monitoring Server "HOT" backup It may be desirable to backup the Tivoli Enterprise Monitoring Server without backing up the entire installation. This type of backup contains the monitoring

More information

Cisco Digital Media System: Cisco Digital Media Manager 5.1

Cisco Digital Media System: Cisco Digital Media Manager 5.1 Cisco Digital Media System: Cisco Digital Media Manager 5.1 The Cisco Digital Media System (DMS) is a comprehensive suite of digital signage, enterprise TV, and desktop video applications that allows companies

More information

AppGate XDP v2.0 Installation from ISO into Virtual Box Hypervisor

AppGate XDP v2.0 Installation from ISO into Virtual Box Hypervisor AppGate XDP v2.0 Installation from ISO into Virtual Box Hypervisor Last Updated March 24 2016 2016 Cryptzone Installation from ISO on a hypervisor This document will provide the necessary step to set up

More information

CS 1361-D10: Computer Science I

CS 1361-D10: Computer Science I CS 1361-D10: Computer Science I Instructor Name: Lopamudra Roychoudhuri Instructor Phone Number: (325) 486-5448 Instructor email: lroychoudhuri@angelo.edu Instructor Office: MCS 205E Class Times: Online,

More information

How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long

How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long Advanced Open-Source /Free Solutions for Home and Small Business Owners Robert Baldi, CISSP- ISSEP TOPICS Encryption Backups Audits Wireless Security Network Security Open Source Goodness ENCRYPTION Encryption

More information

Geography 167: Cartography (Summer 2014, Session A) Instructor Course Description Learning Objectives: Course Delivery Method: online course

Geography 167: Cartography (Summer 2014, Session A) Instructor Course Description Learning Objectives: Course Delivery Method: online course Geography 167: Cartography (Summer 2014, Session A) Instructor: Nick Burkhart Office hours: Tues./Thurs., 9am 10am or by appointment Email: nickburkhart@ucla.edu Skype: nick.uclagis Course Description:

More information

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University chout@ecu.edu Abstract

More information

EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual

EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual Released January 2015 Updated March 2015 Table of Contents Overview...2 General Installation Considerations...2

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Middlesex Community College Fall 2015 Course Syllabus. Course Information: Social Problems (SOC103 CRN 1320 Section 30) 3 Credits

Middlesex Community College Fall 2015 Course Syllabus. Course Information: Social Problems (SOC103 CRN 1320 Section 30) 3 Credits Middlesex Community College Fall 2015 Course Syllabus Course Information: Social Problems (SOC103 CRN 1320 Section 30) 3 Credits Location: Online Instructor: Carmela Smith, MSW, LCSW Phone: best to contact

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Teaching Assistants (contact information for your TAs can be found on the course website): Luis Alvarez, Sarah Halterman, Corey Rovzar and Jason Ward.

Teaching Assistants (contact information for your TAs can be found on the course website): Luis Alvarez, Sarah Halterman, Corey Rovzar and Jason Ward. 1 Geography 7 (WINTER 2015): Introduction to Geographic Information Systems ONLINE Professor Michael Shin (shinm@geog.ucla.edu) Office hours: Wednesdays, 10.30am - Noon or by appointment Office: Bunche

More information

STUDENT HANDBOOK Trent Online

STUDENT HANDBOOK Trent Online STUDENT HANDBOOK Trent Online Trent University 1600 West Bank Dr., Bata Library 202 Peterborough ON K9J 7B8 (705) 748-1011 x7880 online@trentu.ca Table of Contents Contact Information Contacting Trent

More information

Presented By: Bryan Miller CCIE, CISSP

Presented By: Bryan Miller CCIE, CISSP Presented By: Bryan Miller CCIE, CISSP Speaker Introduction Risks Controls Why We Should Pen Test Why We Don t Pen Test Tools & Techniques Low Hanging Fruit Case Studies Copyright 2010 Syrinx Technologies

More information

Bitnami Packaging and Deployment Technology for Server Software

Bitnami Packaging and Deployment Technology for Server Software Bitnami Packaging and Deployment Technology for Server Software A TECHNICAL OVERVIEW Started in 2015, Bitnami s Software Partner Program provides a number of engineering benefits to Independent Software

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

CNA 432/532 OSI Layers Security

CNA 432/532 OSI Layers Security CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: aoolagunju@stcloudstate.edu Office Hrs: 3-4 MW, Office: ECC256 Other

More information

Lakeland Christian Academy Online Course Handbook

Lakeland Christian Academy Online Course Handbook Technology Requirements: General Information: Lakeland Christian Academy Online Course Handbook * American Online (AOL or AIM email addresses) and Netscape do not work with your online courses and cannot

More information

MATH 205 STATISTICAL METHODS

MATH 205 STATISTICAL METHODS Syllabus Greetings and Salutations from the Land of Cool Sunshine! This course has been designed to be entirely online, including examinations. While it doesn't fit the traditional model of a college course,

More information

I. Delivery E-mail: Flash CMS template package... 2. II. Flash CMS template installation... 4. III. Control Panel setup... 5

I. Delivery E-mail: Flash CMS template package... 2. II. Flash CMS template installation... 4. III. Control Panel setup... 5 Contents I. Delivery E-mail: Flash CMS template package... 2 II. Flash CMS template installation... 4 III. Control Panel setup... 5 IV. Control Panel activation... 6 Appendix 1: Switching to binary file

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

The Incident Response Playbook for Android and ios

The Incident Response Playbook for Android and ios SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android

More information

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) The upgrade process for the virtual Cloud Services Appliance is a side- by- side install. This document will walk you through backing

More information