• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Managing Enterprise Cybersecurity

Department of Management Information Systems, Temple University

Managing Enterprise Cybersecurity

MIS 4596.002 ■ Fall 2024 ■ Darin Bartholomew
  • Schedule
  • About
    • Course overview
    • Course materials
    • Grading and Assignments
    • Instructor
  • Labs
  • Lecture Materials

Lecture Materials

Lecture Slides (posted after class)

  • Class 1: MIS4596_Class01_IntroductionToTheCourse
  • Class 2: MIS4596_Class02_ThreatModelingA
    • 2024-dbir-data-breach-investigations-report m-trends-2024 (1)
    • m-trends-2024 (1)
    • https://community.mis.temple.edu/mis4596sec001spring2024/files/2023/01/Exercise-ThreatModeling-cards-deck.pdf
  • Class 3 MIS4596_Class03_Risk Assessment 
  • Class 4 MIS4596_Class04b_GoogleCloudPlatform – student
  • Class 5 MIS4596_Class05_DataPrivacy – student
  • Cipher-wheel-28-print-out
  • Perkley – Cipher Wheel
  • MIS4596_Class06_IntroToCryptography – DB
  • MIS4596_Class07_Milestone 1 Report Review
  • MIS4596_Class08_SymmetricBlockCiphers&Hashing
  • MIS4596_Class10_Asymmetric Cryptography and Signatures
  • MIS4596_Class11_Digital Certificates&PKI
  • https://www.random.org/dice/
  • https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt 
  • MIS4596_Class12_Authentication and passwords
  • MIS4596_Class13_PasswordCracking-A
  • MIS4596_Class14_Vulnerability Scanning
  • MIS4596_Class15_Vulnerability Exploitation
  • MIS4596_Class15a_Milestone 3 – Some thoughts on how to approach – Copy
  •  

__________

NIST Standard and Guideline for Milestone 1:

  • FIPS Publication 199 “Standards for Security Categorization of Federal Information and Information Systems”
  • NIST SP800-60V1R1: “Guide for Mapping Types of Information and Information Systems to Security Categories”
  • NIST SP800-60V2R1: “Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories”

_________________________________________________________________________________________

Other resources:

  • An OpenSSL Manual is available here – for commands for hashing look at chapter 2
  • A Linux Fundamentals guidebook is available here
  • Hydra manual here
  • Hashcat manual here
  • John the Ripper manual here
  • Hash analyzer manual here
  • Sudo manual here
  • Nmap manual here

Primary Sidebar

RECENT ANNOUNCEMENTS

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University