Members Area

 

This is the members area.Right now only the list of the topics that we will cover in June/July 2002 is presented here. Very soon all the links will be active and you will be able to download the material directly from the site. In the mean time, just to encourage the scientist in everyone, take your time out and mail me useful information regarding the topics listed below.

very soon this area will be password protected and access will be restricted to the SIG members only

 

A. Linux  
Part 1 Introduction and Installation of Red Hat Linux Part 2 Configuring Services
Introduction to Unix and Red Hat Linux System startup and shutdown
Installation of Red Hat Linux SMTP and other protocols (POP3, IMAP)
Basic Configuration FTP
Configuring LILO, GRUB Apache Web Server
Configuring X Windows NNTP Server (Internet News Server)
Configuring GNOME Environment Domain Name Service (DNS)
  Network File System (NFS)
  Samba Server
Part 3 System Administration And Management Part 4 Programming in Linux
File Systems, Disk and other Devices Shell Programming
Printing with Linux Gawk programming
TCP/IP Network Management Automating Task
Connecting To Internet Configuring and Building Kernels
Red Hat Graphical Administration Tools Network Programming
Essential System Administration C and C++ Programming
Backup and Restore Perl Programming
System Security Motif Programming
  Tcl and tk Programming
  Programming in Python
  Java Programming

B. Below is the list of Security related topics that we'd be studying

1 - Intro to security threats

2 - Famous security incidents

3 - Reasons of these incidents

4 - Detail protocols study - protocol structure, arch., state machine, weakness, dependencies, vulnerabilities
TCP/IP stack
DNS, telnet, SMTP, pop3, http, ftp ...
...
5 - Security in TCP/IP
Application layer security
Authentication and integrity checks through PGP, GPG, S-HTTP
Transport layer security
SSH
SSL, TLS
Network layer security
IPSec
...
Datalink layer security
...
Authentication
TACACS+
RADIUS
Kerberos
...
...
6 - Programming in C/C++ & Java to use above security features of TCP/IP
What APIs?
How to use?
Technical issues?
...

7 - Attacks by exploiting protocol weakness - study, analysis, counter measures
Syn flood
spoofing
...

8 - Vulnerability in code due to poor programming practices
Format string
Buffer overflow
...

9 - Study of famous information systems that have vulnerabilities
IIS
Windows2000 Win32 module
Linux shell
...

10 - Programming in C/C++ & Java to build exploits and hacking tools

11 - How to test applications against known and unknown vulnerabilities

12 - Complex intrusion intention analysis - attack patterns, strategy, unusual activities ...

 

 

 

 

13 - Cryptography
Encryption/decruption
Types
Algorithms
One way functions
Types
Algorithms
Utilities available - what and how they are use?
...
14 - Programming in C/C++ and Java to use cryptographic technics
What APIs?
How to use them?
Technical issues?
...
15 - User authentication - what and how it is use?
PAM
...
16 - User and groups - what and how they manage?
Utilities and commands
Policies
...
17 - Programming in C/C++ & Java to use OS user authentication and authorization services
What APIs?
How to use them?
Technical issues?
...
18 - How security can be deployed
Using user authentication
Blocking system resources
Hiding resources
Restricting resource access
...
19 - Security in Linux
What?
How it is implemented
What infomration systems are involved?
How they are use?
What can not be achieved from them?
...
20 - Security in Windows NT/XP
What?
How it is implemented
What IS are involved?
How they are use?
What can not be achieved from them?
...
21 - Social Engineering
What?
How it is use?
What are its counter measures?
...
22 - Security policies
What?
How it will be created?
How it will be deployed?
Advantages and disadvantages?
...
23 - Intrusion detection
What?
Intentions?
Techniques?

24 - Intrusion detection system
What?
Classification by architecture
Technical issues

25 - PROJECT - SFD-TIDS

 

Back To Main

[SIGDC Executive Council | ACM CS KU | Other SIG's | Webmaster]