DOC PREVIEW
DMC ITSY 2400 - Learning Activity Plan

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Learning Activity PlanDiscover Linux VulnerabilitiesPart II – Filtering and Event Log to find a specific eventHost# cp /etc/passwd.orig /etc/passwdLab – Using a Keylogger Program in Windows 2000Lab – Security Analyzer on Windows 2000 and Linux AgentLab – Removing unnecessary services and protocols in Windows 2000Learning Activity PlanInformation Technology Security SpecialistITSY-2000OPERATING SYSTEMSSECURITYACKNOWLEDGEMENTSLearning Activity Plan (LAP) developed by: Joe Mallen), faculty member of Southwest Texas Junior College. This LAP was developed under the auspices of the Texas State Leadership Partnership for IT Specialist Curriculum Development and funded bya grant from the Texas Higher Education Coordinating Board, Community and Technical College Division. This LAP is recommended for use by community and technical colleges in Texas.Authorizing Agency: Texas Higher Education Coordinating Board, 1200 East Anderson Lane, Austin, TX 78752 (www.thecb.state.tx.us)Funded by: Carl D. Perkins Vocational Education ActProject Advisor: Rob Franks, Texas Higher Education Coordinating BoardProject Staff:Director, Brent Kesterson, Tech Ed Division, Richland College, 12800 Abrams Road, Dallas, TX 75243Coordinator, Ngoc Truong, Tech Ed Division, Richland College, 12800 Abrams Road, Dallas, TX 75243Project Partners:Collin County Community College, Ann Beheler, Barbara TaylorDallas County Community College District, Don PerryDel Mar College, Larry Lee, Michael HarrisNorth Harris College, Bill Coppola, Allen Rice, Calvin RennelsRichland College, Kay Eggleston, Martha Hogan, Paula DennisSouthwest Texas Junior College, Dick WhippleSouthwest Texas Junior College, Joe MallenTexas State Technical College – Waco, Linda ShorterTyler Junior College, Charles CowellNon-exclusive copyright © 2003. Non-exclusive copyright is retained by the U.S. Department of Education, the Texas Higher Education Coordinating Board, and Richland College. Permission to use or reproduce this document in whole or part is granted for not-for-profit educational and research purposes only. For any other use, please request permission in writing from the Technical Education Division, Richland College, 12800 Abrams Road, Dallas, TX 75243. Phone: 972 238-6396. FAX: 972 238-6905printed 01/14/19.Table of ContentsClassroom Setup Requirements........................................................................................4-5Discover Windows 2000 Vulnerabilities..............................................................................6Discover Linux Vulnerabilities............................................................................................7Configuring an Audit Policy & Manage your Event Logs..................................................8Using Strong Passwords in Windows 2000.........................................................................9Using Strong Passwords in Linux......................................................................................10Viewing Open Ports in Windows 2000..............................................................................11Protecting your OS against Dictionary Attacks.................................................................12Disable terminal access to root account in Linux ...........................................................13Using a Keylogger Program...............................................................................................14Using Security Analyzer on a Win2000 and Linux Client...........................................15-16Removing Unnecessary services and changing Misc. security settings............................17Using Bastille to Reduce the Risk in a Linux System.......................................................183Classroom Setup RequirementsHardware Requirements:The following table is the suggested hardware requirements for this course:Hardware Specifications Greater than or equal to the followingProcessor Intel Pentium II (or equivalent) personal computer with processor greater than or equal to 300 Mhz.L2 Cache 256KBHard Disk 8-GB Hard DriveRAM at least 128 MBCD-ROM 32xNetwork Interface card (NIC) 10BaseT or 100BaseTX (10 or 100 Mbps)Sound card / Speakers Required for Instructor Station, optional for student stationsNetwork Hubs Two 10-port 10Base T or 100BaseTX (10 or 100Mbps)hubsRouter Multi-homed system with three NICs (Windows 2000 server)Software Requirements:The following software is used in this course for both the instructor and student systems. - Microsoft Windows 2000 Server, with Microsoft Internet Explorer 5 or later, including Outlook express. If possible create three partitions: Two should be formatted in NTFS for Windows 2000. A sufficiently large partition should be left completely blank so that it can be used by the Red Hat Linux 7.x Installation.- Current Microsoft Windows 2000 Service Pack (unless otherwise directed in a lesson)- Webtrends Security Analyzer with optional agents for Red Hat Linux (www.webtrends.com)- Ipswitch WS_Ping ProPack Version 2.1 or later (www.ipswitch.com)- Red Button - Netbios Authorization Tool (NAT) - Amecisco Invisisible Keylogger Stealth - Resource Kit Demonstrations files (Diskmap.exe, dmdiag.exe, drivers.exe, pstat.exe, pulist.ext and perms.exe (www.microsoft.com/windows2000/techinfo/reskit/tools/default.asp).- Full Installation of Red Hat Linux (Red Hat Linux 7.x) See Linux installation instructions for component details. Do not choose “server installation” which will completely reformat the hard drive and destroy your Windows 2000 installation. You should have the installation program automatically install the following services:o X Windows4o DNS Package (including Bind V8)o Shadow passwordso Development (contains GNU C compiler)o Both Linuxconf and Gnome Linux-conf (either on the installation disk, at www.rpmfind.net, or at the Linuxconf website: www.solucorp.qc.ca/linuxconf)o Winfile o Fporto Bastille version 1.1.0Note: You can obtain the installation files for Red Hat Linux 7.x a www.redhat.com. If you are new to the Red Hat Linux installation procedure, visit the following site for more detailed instructions on how to install: http://www.redhat.com/docs/manuals/linux/5Discover Windows 2000 Vulnerabilities Learning OutcomeIdentify Windows Vulnerabilities during an initial default installation of the operating system. Students will learn to use a program to discover the built-in accounts on remote servers and use


View Full Document

DMC ITSY 2400 - Learning Activity Plan

Download Learning Activity Plan
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Learning Activity Plan and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Learning Activity Plan 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?