Indicative Content |
Computer Security
Review of CIA model, OS updates and package management, verifying checksums on downloaded packages.
|
Securing Systems
Securing against common vulnerabilities (e.g. XSS, DDoS, DNS Poisoning). Security keys and key management (e.g. SSH and PGP). Encryption and encryption tools e.g. VeraCrypt.
|
System Monitoring
Setup and configuration of automated monitoring software such as Nagios and Zabbix to monitor system processes, usage of system resources, and file systems. Examine Nikto for Web Servers.
|
Security Tools
Configuring firewalls, implementing honeypots and examining SIEM and IDS tools such as Snort, security scanning tools such as Nessus.
|
Mitre Attack Framework
Overall analysis and evaluation of the Mitre Attack Framework and implementation of sections where appropriate.
|
SETU Carlow Campus reserves the right to alter the nature and timings of assessment
Module Resources
|
Recommended Book Resources |
---|
-
Chris Sanders. Intrusion Detection Honeypots: Detection through Deception, 1st Edition, Applied Network Defense, p.238, [ISBN: 978173518830].
-
Lee Brotherston and Amanda Berlin. Defensive Security Handbook: Best Practices for Securing Infrastructure, 1st Edition, O'Reilly Media, p.284, [ISBN: 97849196038].
-
Richard Bejtlich. The Practice of Network Security Monitoring: Understanding Incident Detection and Response, 1st Edition, No Starch Press, p.376, [ISBN: 978159327509].
|
This module does not have any article/paper resources |
---|
This module does not have any other resources |
---|