IT Services IT Security IT Security for Research INTRODUCTION System owners and managers at UCD are responsible for the data and servers they operate on the UCD network. This course aims to facilitate researchers that operate such systems in UCD to manage their systems in a way that ensures their reliability and protection. The course is aimed at technical staff, systems administrators and those interested in technical aspects of operational security. Attendees will find it useful to bring a laptop, but it isn’t required. FORMAT The course is presented as a series of four half day modules, and is a combination of material presentation, collaborative discussion, and hands on technical exercises. Full course and reference materials are supplied. All modules are mandatory. MODULE 1: SECURITY CONCEPTS This module is an overview of conventional approaches to Security concepts, Information Security Management and Security Design thinking. It draws from a number of source modules, including: ISO 17799 – Standard for Information Security Management. Security engineering and design. Standard operating practices for Systems Administrators. Information Security and Economics. Security @UCD MODULE 2: IP NETWORK SECURITY This module prepares participants to use plan, implement, and troubleshoot IP networks within UCD. Review of security concepts applied to networks. Introduction to IP Networking OSI Network model Ethernet and network switching IP Networking, TCP, and UDP Core Network Services- DNS, DHCP Firewall concepts and design. IP Network design for small networks. Using Common Network Security tools for protection, troubleshooting and assessment. Version:1.0- 26/08/2008 ID:ITSEC-TRG-001 Page 1 of 3 Status: Issued IT Services IT Security MODULE 3: SYSTEMS SECURITY This module prepares attendees to plan, implement and secure a linux server on the UCD campus network. There exists a windows oriented version of this module which can be presented on request. Overview of Operating systems concepts Security concepts for systems administration. Linux system overview System security requirements and system planning. Secure system configuration and management. Using common security tools for system security. MODULE 4: APPLICATIONS SECURITY AND REQUESTED TOPICS. This module covers concepts and skills necessary to manage the security of a web application or other remotely accessed services on a server. It’s also the customisable portion of the course specifically geared to the requests of attendees. Review of security concepts. Web server security concepts. Web server security configuration. Configuring SSH securely. Certificates, PKI and VPNs Requested topics: In the past, this has included Windows Server Security, extended coverage of cryptography, general topics such as antivirus, malware, deceptive information gathering (social engineering), and legal aspects of IT Security. RECOMMENDED TEXT: There is no required text for the course, however, attendees have found the following books useful: Linux Server Security (2nd Edition) Michael D Bauer- O’Reilly press, Security Engineering- Ross Anderson-Wiley. The books below are generally a good read, are relevant to aspects of the course, and provide excellent material for casual conversation: Secrets & Lies- Digital Security in a Networked world- Bruce Schneier The Code Book- Simon Singh Information Rules- Carl Shapiro and Hal Varian TOOLS: A number of open source tools are used or recommended as part of the course. These Include: Version:1.0- 26/08/2008 Nessus ID:ITSEC-TRG-001 Page 2 of 3 Wireshark Status: Issued IT Services Version:1.0- 26/08/2008 IT Security SSH IPtables Passwordsafe Various testing tools. ID:ITSEC-TRG-001 Page 3 of 3 Status: Issued