Welcome to CS150 Introduction to Computer Security. This class is an overview class, where you will learn about in many different aspects of Cyber Security and Information Assurance ranging from Cryptology to Pen Testing & Vulnerability Analysis. Because this is an overview class there won’t be time to go into depth in any of the subjects but all of the subjects are covered in depth in later CSIA classes. And while the class is really aimed at preparing you for a career as a cyber security specialist who will be responsible for protecting devices and data for a company or organization, the knowledge you gain in this class can also be applied to your personal devices and home network, and should help you improve your overall security.
The information on this page is meant as a supplement for students in my college class. So note that the section numbering used below may look like some sections are missing. But don’t worry. Everything you need for the class is here. The numbering is funny because it follows the numbering of the chapters in the book, and we’re not going to use the entire book in this class.
0 – Class Introduction
- Getting Started in This Course – Read This First
- How to Determine Your Class Mode
- What You Will Learn – Course Purpose
- Course Syllabus
- Instructor Contact Information & Biography
- Course Resources
Course and College Policies
- Course Grading and Late Work Policies
- Guidelines for Written Projects
- Help with Writing Assignments (Video)
- Checking Your TurnItIn Score (Video)
- Course Attendance Policy
- Other Course, Department and College Policies
1 – Introduction to Security
- Lecture Notes – This document contains things I would normally tell you in class, plus tips on completing the assignments.
- [OPTIONAL] Introduction to Virtualization and Virtual Machines (Video)
- [OPTIONAL] Virtual Machine and Virtual Network Benefits (Video)
- [OPTIONAL] Virtual Machine Costs (Video)
- Connecting to your virtual machine in the CBC Cloud using HTML5 (Video)
- Connecting to your virtual machine in the CBC Cloud using the vConnector (Video) Note – You don’t need to do this if you were able to connect to your VM with HTML5.
- Creating Users in the CBC Cloud VM (Video)
2 – Threat Management & Cybersecurity Resources
- Lecture Notes – This document contains things I would normally tell you in class, plus tips on completing the assignments.
- What is a CVE (Video)
- Viewing the old CVE web site (Video)
- Viewing the new CVE web site (Video)
- [OPTIONAL] Port Scanning Background (Video)
- [OPTIONAL] Using nmap (Video)
3 – Threats & Attacks on Endpoints
- Lecture Notes – Things I would normally tell you in class
- Macro Virus Background – Creating a Macro (Video)
- Autorun Macros (Video)
- Ransomware Background with OpenSSL pt 1 (Video)
- Ransomware Background with OpenSSL pt 2 (Video)
- SQL Injection Background & Demonstration (Video)
- [OPTIONAL] Cross Site Scripting XSS Background (Video)
4 – Endpoint and Application Development Security
- Lecture Notes – Things I would normally tell you in class
- Controlling Password Strength & Timeouts with Windows Local Security Policies (Video)
- [OPTIONAL] Home Security – Configuring Windows Defender Anti-Malware (Video)
- [OPTIONAL] Home Security – Windows Update (Video)
- [OPTIONAL] Home Security – Tools for Checking Application Programs for Updates (Video)
- [OPTIONAL] Tools for Checking Browser Plugins/Add-ons for Updates (Video)
5 – Mobile, Embedded and Specialized Device Security
- Lecture Notes – Things I would normally tell you in class
- Help with Reading QR Codes Hands-On Project (Video)
6 – Basic Cryptography
- Lecture Notes – This document contains things I would normally tell you in class, plus tips on completing the assignments.
- Hashcalc download (.zip)
- Tips for downloading Hashcalc (Video)
- Hashing Overview (Video)
- Configuring EFS and Starting Service (Video)
- gc.jpg – required for homework
8 – Networking Threats, Assessments, and Defenses
- Lecture Notes – Things I would normally tell you in class, plus tips on completing the assignments.
- ipconfig, ping, and tracert commands (Video)
- Visual tracert (Video)
- Basic Home Router Security (Video)
- [OPTIONAL] Viewing Wireless Router Logs (old version) – Includes information on locating router’s IP and Admin password (Video)
- DNS and DNS Poisoning (Video)
- Tips for Completing the DNS Poisoning Hands-On Project (Video)
12 – Authentication
- Lecture Notes – Things I would normally tell you in class
- Hashing vs. Encryption (Video)
- Alternate Assignment (See Lecture Notes) – Picture Password Simulation Website Demonstration (Video)
13 – Incident Preparation, Response, and Investigation
- Lecture Notes – Things I would normally tell you in class
- What is UAC (Video)
- How UAC Should Work (Video)
- Windows Group Policy Editor and UAC (Video)
- Completing the UAC Hands-On Project on the class VM (Video)
- Explanation of Slack Space (Video)
- Using Directory Snoop part 1 (Video) – An explanation of how to use Directory Snoop
- Using Directory Snoop part 2 (Video) – Using Directory Snoop to complete the assignment, and a way to really check slack space.
14 – Business Continuity
- Lecture Notes – Things I would normally tell you in class
- Creating a list of the installed hardware, and a list of the software keys with Belarc (Video)
- Windows File History Backup Lab Demo (Video)
- Changing Directories in a CMD Window – Help with the ATTRIB assignment (Video)
15 – Risk Management & Data Privacy
- Lecture Notes – Things I would normally tell you in class