Module 1: Security Concepts

advertisement
IT Services
IT Security
IT Security for Research
INTRODUCTION
System owners and managers at UCD are responsible for the data and servers they
operate on the UCD network. This course aims to facilitate researchers that operate
such systems in UCD to manage their systems in a way that ensures their reliability and
protection.
The course is aimed at technical staff, systems administrators and those interested in
technical aspects of operational security. Attendees will find it useful to bring a
laptop, but it isn’t required.
FORMAT
The course is presented as a series of four half day modules, and is a combination of
material presentation, collaborative discussion, and hands on technical exercises. Full
course and reference materials are supplied. All modules are mandatory.
MODULE 1: SECURITY CONCEPTS
This module is an overview of conventional approaches to Security concepts,
Information Security Management and Security Design thinking. It draws from a
number of source modules, including:





ISO 17799 – Standard for Information Security Management.
Security engineering and design.
Standard operating practices for Systems Administrators.
Information Security and Economics.
Security @UCD
MODULE 2: IP NETWORK SECURITY
This module prepares participants to use plan, implement, and troubleshoot IP
networks within UCD.









Review of security concepts applied to networks.
Introduction to IP Networking
OSI Network model
Ethernet and network switching
IP Networking, TCP, and UDP
Core Network Services- DNS, DHCP
Firewall concepts and design.
IP Network design for small networks.
Using Common Network Security tools for protection, troubleshooting and
assessment.
Version:1.0- 26/08/2008
ID:ITSEC-TRG-001
Page 1 of 3
Status: Issued
IT Services
IT Security
MODULE 3: SYSTEMS SECURITY
This module prepares attendees to plan, implement and secure a linux server on the
UCD campus network. There exists a windows oriented version of this module which
can be presented on request.






Overview of Operating systems concepts
Security concepts for systems administration.
Linux system overview
System security requirements and system planning.
Secure system configuration and management.
Using common security tools for system security.
MODULE 4: APPLICATIONS SECURITY AND REQUESTED TOPICS.
This module covers concepts and skills necessary to manage the security of a web
application or other remotely accessed services on a server. It’s also the
customisable portion of the course specifically geared to the requests of attendees.
 Review of security concepts.
 Web server security concepts.
 Web server security configuration.
 Configuring SSH securely.
 Certificates, PKI and VPNs
Requested topics: In the past, this has included Windows Server Security, extended
coverage of cryptography, general topics such as antivirus, malware, deceptive
information gathering (social engineering), and legal aspects of IT Security.
RECOMMENDED TEXT:
There is no required text for the course, however, attendees have found the following
books useful: Linux Server Security (2nd Edition) Michael D Bauer- O’Reilly press,
Security Engineering- Ross Anderson-Wiley.
The books below are generally a good read, are relevant to aspects of the course,
and provide excellent material for casual conversation:



Secrets & Lies- Digital Security in a Networked world- Bruce Schneier
The Code Book- Simon Singh
Information Rules- Carl Shapiro and Hal Varian
TOOLS:
A number of open source tools are used or recommended as part of the course.
These Include:

Version:1.0- 26/08/2008
Nessus

ID:ITSEC-TRG-001
Page 2 of 3
Wireshark
Status: Issued
IT Services
Version:1.0- 26/08/2008
IT Security

SSH

IPtables

Passwordsafe

Various testing tools.
ID:ITSEC-TRG-001
Page 3 of 3
Status: Issued
Download