{"id":409,"date":"2020-09-03T12:27:21","date_gmt":"2020-09-03T16:27:21","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/?page_id=409"},"modified":"2024-10-24T14:45:42","modified_gmt":"2024-10-24T18:45:42","slug":"lecture-materials","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/lecture-materials\/","title":{"rendered":"Lecture Materials"},"content":{"rendered":"<p>Lecture Slides (posted after class)<\/p>\n<ul>\n<li>Class 1: <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/08\/MIS4596_Class01_IntroductionToTheCourse.pptx\">MIS4596_Class01_IntroductionToTheCourse<\/a><\/li>\n<li>Class 2: <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class02_ThreatModelingA.pdf\">MIS4596_Class02_ThreatModelingA<\/a>\n<ul>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/2024-dbir-data-breach-investigations-report.pdf\">2024-dbir-data-breach-investigations-report<\/a> <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/m-trends-2024-1.pdf\">m-trends-2024 (1)<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/m-trends-2024-1.pdf\">m-trends-2024 (1)<\/a><\/li>\n<li>https:\/\/community.mis.temple.edu\/mis4596sec001spring2024\/files\/2023\/01\/Exercise-ThreatModeling-cards-deck.pdf<\/li>\n<\/ul>\n<\/li>\n<li>Class 3 <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class03_Risk-Assessment.pptx\">MIS4596_Class03_Risk Assessment<\/a>\u00a0<\/li>\n<li>Class 4 <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class04b_GoogleCloudPlatform-student.pptx\">MIS4596_Class04b_GoogleCloudPlatform &#8211; student<\/a><\/li>\n<li>Class 5 <a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class05_DataPrivacy-student.pdf\">MIS4596_Class05_DataPrivacy &#8211; student<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/Cipher-wheel-28-print-out.pdf\">Cipher-wheel-28-print-out<\/a><\/li>\n<li><a title=\"Protected by Outlook: https:\/\/www.perkley.com\/cipher-wheel\/. Click or tap to follow the link.\" href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.perkley.com%2Fcipher-wheel%2F&amp;data=05%7C02%7C%7C1963309146224d56ea7708dcd8dfd326%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638623703037305658%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=h9nrX0GvHAz7vrLeG86pLIx2VUJyzpvi9INHxpHpekw%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"2\" data-ogsc=\"\">Perkley &#8211; Cipher Wheel<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class06_IntroToCryptography-DB.pptx\">MIS4596_Class06_IntroToCryptography &#8211; DB<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class07_Milestone-1-Report-Review.pptx\">MIS4596_Class07_Milestone 1 Report Review<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/09\/MIS4596_Class08_SymmetricBlockCiphersHashing.pptx\">MIS4596_Class08_SymmetricBlockCiphers&amp;Hashing<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class10_Asymmetric-Cryptography-and-Signatures.pptx\">MIS4596_Class10_Asymmetric Cryptography and Signatures<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class11_Digital-CertificatesPKI.pptx\">MIS4596_Class11_Digital Certificates&amp;PKI<\/a><\/li>\n<li><a href=\"https:\/\/www.random.org\/dice\/\">https:\/\/www.random.org\/dice\/<\/a><\/li>\n<li><a href=\"https:\/\/www.eff.org\/files\/2016\/07\/18\/eff_large_wordlist.txt\">https:\/\/www.eff.org\/files\/2016\/07\/18\/eff_large_wordlist.txt\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class12_Authentication-and-passwords.pptx\">MIS4596_Class12_Authentication and passwords<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class13_PasswordCracking-A.pptx\">MIS4596_Class13_PasswordCracking-A<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class14_Vulnerability-Scanning.pptx\">MIS4596_Class14_Vulnerability Scanning<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class15_Vulnerability-Exploitation.pptx\">MIS4596_Class15_Vulnerability Exploitation<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/files\/2024\/10\/MIS4596_Class15a_Milestone-3-Some-thoughts-on-how-to-approach-Copy.pptx\">MIS4596_Class15a_Milestone 3 &#8211; Some thoughts on how to approach &#8211; Copy<\/a><\/li>\n<li>\u00a0<\/li>\n<\/ul>\n<p>__________<\/p>\n<p>NIST Standard and Guideline for Milestone 1:<\/p>\n<ul>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sp2017online\/files\/2017\/01\/FIPS-PUB-199-final.pdf\">FIPS Publication 199 \u201cStandards for Security Categorization of Federal Information and Information Systems\u201d<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis5214sec001spring2023\/files\/2020\/12\/nistspecialpublication800-60v1r1.pdf\">NIST SP800-60V1R1: \u201cGuide for Mapping Types of Information and Information Systems to Security Categories\u201d<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis5214sec001spring2023\/files\/2019\/01\/nistspecialpublication800-60v2r1.pdf\">NIST SP800-60V2R1: \u201cAppendices to Guide for Mapping Types of Information and Information Systems to Security Categories\u201d<\/a><\/li>\n<\/ul>\n<p>_________________________________________________________________________________________<\/p>\n<p>Other resources:<\/p>\n<ul>\n<li>An OpenSSL Manual is available\u00a0<a href=\"https:\/\/community.mis.temple.edu\/mis4596sec001spring2022\/files\/2022\/02\/openssl.pdf\">here<\/a>\u00a0\u2013 for commands for hashing look at chapter 2<\/li>\n<li>A Linux Fundamentals guidebook is available\u00a0<a href=\"https:\/\/community.mis.temple.edu\/mis4596sec001spring2022\/files\/2022\/02\/linuxfundamentals.pdf\">here<\/a><\/li>\n<li>Hydra manual <a href=\"https:\/\/www.systutorials.com\/docs\/linux\/man\/1-hydra\/\">here<\/a><\/li>\n<li>Hashcat manual <a href=\"https:\/\/hashcat.net\/wiki\/doku.php?id=hashcat\">here<\/a><\/li>\n<li>John the Ripper manual <a href=\"https:\/\/www.openwall.com\/john\/doc\/\">here<\/a><\/li>\n<li>Hash analyzer manual <a href=\"https:\/\/www.tunnelsup.com\/hash-analyzer\/\">here<\/a><\/li>\n<li>Sudo manual <a href=\"https:\/\/man7.org\/linux\/man-pages\/man8\/sudo.8.html\">here<\/a><\/li>\n<li>Nmap manual <a href=\"https:\/\/nmap.org\/book\/man.html\">here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Lecture Slides (posted after class) Class 1: MIS4596_Class01_IntroductionToTheCourse Class 2: MIS4596_Class02_ThreatModelingA 2024-dbir-data-breach-investigations-report m-trends-2024 (1) m-trends-2024 (1) https:\/\/community.mis.temple.edu\/mis4596sec001spring2024\/files\/2023\/01\/Exercise-ThreatModeling-cards-deck.pdf Class 3 MIS4596_Class03_Risk Assessment\u00a0 Class 4 MIS4596_Class04b_GoogleCloudPlatform &#8211; student Class 5 MIS4596_Class05_DataPrivacy &#8211; student Cipher-wheel-28-print-out Perkley &#8211; Cipher Wheel MIS4596_Class06_IntroToCryptography &#8211; DB MIS4596_Class07_Milestone 1 Report Review MIS4596_Class08_SymmetricBlockCiphers&amp;Hashing MIS4596_Class10_Asymmetric Cryptography and Signatures MIS4596_Class11_Digital Certificates&amp;PKI https:\/\/www.random.org\/dice\/ https:\/\/www.eff.org\/files\/2016\/07\/18\/eff_large_wordlist.txt\u00a0 MIS4596_Class12_Authentication and passwords [&hellip;]<\/p>\n","protected":false},"author":3172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-409","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/pages\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/users\/3172"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":317,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/pages\/409\/revisions"}],"predecessor-version":[{"id":1220,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/pages\/409\/revisions\/1220"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2024\/wp-json\/wp\/v2\/media?parent=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}