Skip to content

Latest commit

 

History

History
executable file
·
45 lines (38 loc) · 943 Bytes

notes.md

File metadata and controls

executable file
·
45 lines (38 loc) · 943 Bytes

Add implicit deny ufw Notes: Maybe having pen testing first would be more interesting, get them into the mindset and such

  1. Windows Server
  • Active Directory
  • Remote Authentication with AD / Kerberos
  • ISS
  • File Sharing
  • Remote Access
  1. Linux Server
  • SSH Security
  • Basic Unix Security
  • Kerberos Authentication
  • Updating software
  • Looking for malicious software
  1. Router / Firewall
  • Network Basics / Refresher
  • Network Layout / Infrastructure
  • Cisco
  • Basic Firewall / ACL Setup
  • Firewall Software
  1. Web App
  • SQL Injection
  • Cross Site Scripting
  • ??
  1. IDS, Snort
  • What is an IDS?
  • Types of IDS (IDS, IPS, Local, Transparent)
  • How to setup common IDS (Snort, ??)
  1. Pen Testing
  • NMap
  • Vulnerability Scanners (OpenVAS, ??)
  • Threat level assessment

Notes: End result first, see the attack first Exercise on how to prevent it Backround information to understand it Feedback at end of modules to improve 'course' .