Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10....
Transcript of Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10....
![Page 1: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/1.jpg)
Cybersecurity at CIMichael Soltys
Professor and Chair of Computer Science
October 18, 2018 Point Mugu
NAWCWD Cybersecurity Collaboration
�1 /15
![Page 2: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/2.jpg)
California State University at Channel Islands: Department of Computer Science
![Page 3: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/3.jpg)
OutlineCybersecurity at CI
Digital Forensics Collaboration with HTTF Penetration Testing
!3
![Page 4: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/4.jpg)
SEAKER
!4
![Page 5: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/5.jpg)
Voyager
!5
![Page 6: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/6.jpg)
Password Beast
!6
![Page 7: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/7.jpg)
Virus Total
!7
![Page 8: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/8.jpg)
COMP 424/524
AWUS 036 ACH
!8
![Page 9: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/9.jpg)
Course Outline1. Crypto: basics
2. Crypto: symmetric ciphers, Assignment: break a MAC
3. Crypto: DES, IDEA, AES, htpasswd; case study: break WEP
4. Crypto: blocks & hashes
5. Crypto: public key: D-H, ElGamal, RSA, elliptic curves
6. Authentication: kerberos
7. Tools:
I. OpenSSL & GnuPG
II. Hashcat & John Ripper
III. Kali Linux, Wireshark & Palo Alto Firewalls
IV. Malware
9
![Page 10: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/10.jpg)
Cryptoanalysis How to break a code
Encoding vs Encryption
!10
![Page 11: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/11.jpg)
Needham-Schroeder Protocol
!11
![Page 12: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/12.jpg)
8. CompTIA ASecurity +
9. AWS security
10. Another assignment, usually coding in Python
11. Presentations
I. Long list of articles (articles more current than textbooks)
II. Ability to articulate ideas about security
12
![Page 13: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/13.jpg)
Penetration Testing
Kali Linux Wireshark
Palo Alto Firewall!13
![Page 14: Cybersecurity at CIprof.msoltys.com/.../2018/10/PointMugu-Oct18-2018.pdf · AWS security 10. Another assignment, usually ... PointMugu-Oct18-2018 Created Date: 10/16/2018 2:26:56](https://reader036.fdocuments.us/reader036/viewer/2022081407/5f2afc85c9864c1ac23ca063/html5/thumbnails/14.jpg)
Penetration testing tools on Kali Linux
1. Nmap
2. Aircrack-ng
3. Wifiphisher
4. Burp Suite
5. OWASP ZAP
6. SQLmap
7. CrackMapExec
8. Impacket
9. PowerSploit
10. Luckystrike
11. BeEF
12. THC-Hydra
13. Immunity
14. Social Engineering Toolkit
14