• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Managing Enterprise Cybersecurity

Department of Management Information Systems, Temple University

Managing Enterprise Cybersecurity

MIS 4596.002 ■ Fall 2023 ■ David Lanter
  • Schedule
  • About
    • Course overview
    • Course materials
    • Grading and Assignments
    • Instructor
  • Labs
  • Lecture Materials

Lecture Materials

  • Class 1: Introduction presentation
  • Class 2: Threat Modeling presentation and Cards
  • Class 3: Risk Assessment presentation
  • Class 4a: Milestone 1 Risk Assessment Report Q&A & Class 4b (aka “Class 5”): Introduction to Linux & Google Cloud Platform presentation
  • Class 5 (aka “Class 6”): Data Privacy presentation
  • Class 7: Introduction to Cryptography presentation, Cypher Wheel Printout
  • Class 8: Symmetric Cryptography and Hashing presentation
  • Class 9: Milestone 1 Review with Guidance for Milestone 2 presentation
  • Class 10: Asymmetric Cryptography and Signatures presentation
  • Class 11: Digital Certificates & PKI presentation
  • Class 12: Authentication & Passwords presentation
  • Class 13: Password Cracking presentation
  • Class 14: Vulnerability Scanning presentation
  • Class 15: Vulnerability Exploitation presentation
  • Class 16: Human Element presentation
  • Class 17: Physical Security presentation
  • Class 18: Malware Analysis presentation
  • Class 19: Network Security Monitoring presentation
  • Class 20: Equifax Breach Case Study – Breakout Group questions
  • Class 21: Maersk Breach Case Study – Breakout Group questions
  • Class 22: Milestone 4 Guidance presentation

_________________________________________________________________________

NIST Standard and Guideline for Milestone 1:

  • FIPS Publication 199 “Standards for Security Categorization of Federal Information and Information Systems”
  • NIST SP800-60V1R1: “Guide for Mapping Types of Information and Information Systems to Security Categories”
  • NIST SP800-60V2R1: “Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories”

_________________________________________________________________________________________

  • An OpenSSL Manual is available here – for commands for hashing look at chapter 2
  • A Linux Fundamentals guidebook is available here
  • Hydra manual here
  • Hashcat manual here
  • John the Ripper manual here
  • Hash analyzer manual here
  • Sudo manual here
  • Nmap manual here

Primary Sidebar

RECENT ANNOUNCEMENTS

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University