ICS Lab_Ajou University

 

Hand-on Materials for Advanced Information Security Class


Taeshik Shon
Department of Computer Engineering
Ajou University
sites.google.com/a/ajou.ac.kr/tsshon/


This website's goal is to provide students with a thorugh understanding of the security issues associated with the design, provision and management of security services for modern information systems, applications, and services. This course deals with fundamental security concepts, techniques and services. Thus this course will provide a comprehensive introduction and study into a broad selection of contemporary information security issues, concepts and policies. Through out this Lab, students will covers basic lectures on Linux Security, Web Security, Network Security and Digital Forensics

 

Assumptions

 Computer Programming, Computer Systems, and other fundamental background knowledge on Computer Science and Engineering will help student get through this course.

 

Hand-on Lab Materials (Slides, Tutorials, etc.)

o        Lab 0 : Linux Basics(Ubuntu)

-       Installation Of Linux (Ubuntu) on VMware

-       Introduction to Linux

-       Basic Linux Commands

 

o        Lab 1 : Cryptography

-       Classical Ciphers

-       Symmetric Key (DES, AES, etc,)

-       Asymetric Key (RSA, ECC, etc)

-       Hash, Digital Signature

 

o        Lab 2 : Steganography

-       What is Steganography

-       How to Conceal Data

-       How to Use Steganography Tool

-       Case Study

-       Problem from Cryptography Contest(Stegano Problem)

 

o        Lab 3 : OWASP Vulnerabilities with WebGoat

-       What is OWASP and Top ten Vulnerabilities

-       OWASP Top Ten Vulnerabilities Test Bed : WebGoat

-       Installation of WebGoat

-       How to use WebGoat

-       Hands on Practice - Buffer Overflow

 

o        Lab 4 : Linux Kernel Module & LSM 

-       What is Linux Kernel Module

-       How to Compile Linux Kernel

-       Introduction to LSM

 

o        Lab 5 : Memory Forensics

-       Introduction to Memory Forensics

-       Memory Forensic Process

-       Capture and Analyze Memory Dump

 

o        Lab 6 : Forensic Framework : Encase  

-       What is Encase

-       How to use Encase

-       Hands on Practice

 

o        Lab 7 : Web Browser Forensics

-       What is Web Browser Forensics

-       Web Forensic Tool Experiment

 

o        Lab 8 : Network Packet Capture : Wireshark

-       Introduction to Wireshark

-       How to Capture Packets

-       Introducing Filtering Feature

-       How to use Statistics Feature of Wireshark

 

o        Lab 9 : OS Fingerprinting

-       What is Operating System Fingerprinting

-       OS Fingerprinting Techniques

-       How to use p0f(OS Fingerprinting Tool)

 

o        Lab 10 : Intrusion Detection System

-       What is Intrusion Detection System(IDS)

-       Introducing Intrusion Detecting Techniques

-       How to use Snort (IDS Tool)

 

o        Lab 11 : DataMining Tool : WEKA

-       What is WEKA

-       How to use Datamining Techniques

-       How to use WEKA for each Techniques

 

 

 

Copyright © 2014 ICS Lab. Ajou Univ. All rights reserved.