{"id":22,"date":"2018-01-17T14:36:08","date_gmt":"2018-01-17T19:36:08","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=22"},"modified":"2020-04-15T11:52:37","modified_gmt":"2020-04-15T15:52:37","slug":"schedule","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/","title":{"rendered":"Schedule"},"content":{"rendered":"<div>\n<table style=\"width: 81.6473%;height: 2490px\">\n<thead>\n<tr style=\"height: 23px\">\n<th style=\"width: 13.0924%;height: 23px\">DATES<\/th>\n<th style=\"width: 44.3229%;height: 23px\">TOPIC<\/th>\n<th style=\"width: 86.2641%;height: 23px\">Assignments Due (5:30pm Before Class)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 175px\">\n<td style=\"width: 13.0924%;height: 175px\"><strong>Wednesday, 1\/15\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 175px\">\n<p>Introduction to the Course<\/p>\n<p>Threat Modeling<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 175px\">\n<p>Anderson, Ch. 1<\/p>\n<p>Read the beginning of each chapter, skim the rest of the chapter:<\/p>\n<p>\u201cThreat Modeling,\u201d by Adam Shostack, <a href=\"https:\/\/ebookcentral.proquest.com\/lib\/templeuniv-ebooks\/reader.action?ppg=23&amp;docID=1629177&amp;tm=1535828412602\">Introduction<\/a>, <a href=\"https:\/\/ebookcentral.proquest.com\/lib\/templeuniv-ebooks\/reader.action?ppg=39&amp;docID=1629177&amp;tm=1535233638108\">Chapter 1<\/a>, <a href=\"https:\/\/ebookcentral.proquest.com\/lib\/templeuniv-ebooks\/reader.action?ppg=123&amp;docID=1629177&amp;tm=1535233722520\">Chapter 4<\/a><\/p>\n<p>Optional:\u00a0<span style=\"font-family: inherit;font-size: inherit\">Schneier, <\/span><a style=\"font-family: inherit;font-size: inherit\" href=\"https:\/\/doi-org.libproxy.temple.edu\/10.1002\/9781119183631.ch21\">Chapter 21<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 1\/22\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p>Introduction to Linux | Google Cloud Platform (GCP)<\/p>\n<p>Introduction to Cryptography<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 215px\">\n<td style=\"width: 13.0924%;height: 215px\"><strong>Wednesday, 1\/29\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 215px\">\n<p>Symmetric Cryptography<\/p>\n<p>&nbsp;<\/p>\n<p>Asymmetric Cryptography<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 215px\">\n<p><b>Lab 1: Threat Modeling<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b>Quiz: <a name=\"OLE_LINK45\"><\/a><a name=\"OLE_LINK7\"><\/a><a name=\"OLE_LINK1\"><\/a>Anderson, Ch. 5, pp. 129-149 (2nd ed.); pp. 138\u2013156 (3rd ed.).<\/b><\/p>\n<p><strong>Tutorial: Introduction to Linux<\/strong><\/p>\n<p><strong>Tutorial: Introduction to Google Cloud Platform<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 2\/5\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p>Crypto Wars<\/p>\n<p>Digital Certificates and PKI<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\"><strong>Lab 2: Symmetric Cryptography<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 415px\">\n<td style=\"width: 13.0924%;height: 415px\"><strong>Wednesday, 2\/12\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 415px\">\n<p><strong>Assign Milestone 1: Threat model<\/strong><\/p>\n<p>Authentication and Passwords<\/p>\n<p>Password Cracking<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 415px\">\n<p>2nd edition: Anderson Ch. 2, pp. 31-39, 56-58<\/p>\n<p>Or:<\/p>\n<p>3rd edition: Anderson Ch. 3, pp. 90-97 (section 3.4\u20133.4.4.2)-, pp. 105-110 (section 3.4.9\u20133.4.12)\u00a0<\/p>\n<p>Gosney, &#8220;<a href=\"http:\/\/arstechnica.com\/security\/2016\/06\/how-linkedins-password-sloppiness-hurts-us-all\/\">How LinkedIn\u2019s password sloppiness hurts us all<\/a>&#8220;<\/p>\n<p>Goodin, &#8220;<a href=\"http:\/\/arstechnica.com\/security\/2012\/08\/passwords-under-assault\">Why passwords have never been weaker<\/a>&#8221;\u00a0<\/p>\n<p><strong>Quiz: Authentication and Passwords<\/strong><\/p>\n<p><strong style=\"font-family: inherit;font-size: inherit\">Lab 3: Asymmetric Cryptography<\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 2\/19\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p>&nbsp;<\/p>\n<p>Introduction to networking<\/p>\n<p>Vulnerability Scanning<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.0924%\"><strong>Wednesday, 2\/26\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%\">\n<p><strong>No class; Milestone group work day\u00a0<\/strong><\/p>\n<\/td>\n<td style=\"width: 86.2641%\">\n<p><strong><b>Lab 4: Digital Certificates and PKI<\/b><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.0924%\"><strong>Wednesday, 3\/4\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%\">\n<p><strong>No class; Spring Break<\/strong><\/p>\n<\/td>\n<td style=\"width: 86.2641%\">\n<p><strong>\u00a0<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 3\/11\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p><span style=\"color: #000000\"><strong>Assign Milestone 2: Penetration test<\/strong><\/span><\/p>\n<p>Vulnerability Exploitation<\/p>\n<p>In-class lab work<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\">\n<p><span style=\"color: #ff0000\"><strong>Milestone 1: Threat Model due<\/strong><\/span><\/p>\n<p><strong>Lab 5: Password Cracking<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 135px\">\n<td style=\"width: 13.0924%;height: 135px\"><strong>Wednesday, 3\/18\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 135px\">\n<p>&nbsp;<\/p>\n<p>Exploitation demonstration<\/p>\n<p><span style=\"color: #000000\">Milestone group workday<\/span><\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 135px\">\n<p>&nbsp;<\/p>\n<p><strong>Lab 6: Vulnerability Scanning<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 175px\">\n<td style=\"width: 13.0924%;height: 175px\"><strong>Wednesday, 3\/25\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 175px\">\n<p><span style=\"color: #000000\"><strong>Assign Milestone 3<\/strong><\/span><\/p>\n<p>Physical security<\/p>\n<p>The Human Element of Security<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 175px\">\n<p>&nbsp;<\/p>\n<p>Online video: Bruce Schneier, <a href=\"http:\/\/www.ted.com\/talks\/bruce_schneier.html\">The Security Mirage<\/a><\/p>\n<p>&#8220;<a href=\"https:\/\/www.wired.com\/2012\/09\/cosmo-the-god-who-fell-to-earth\/\">Cosmo, the Hacker \u2018God\u2019 Who Fell to Earth<\/a>,&#8221; by Mat Honan.<\/p>\n<p><strong>Anderson, Chapter 11 (Physical Protection)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 4\/1\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p><span style=\"color: #000000\"><strong>Assign Milestone 4<\/strong><\/span><\/p>\n<p>Incident Response<\/p>\n<p>Information Privacy<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\">\n<p><strong>Quiz: Anderson, Chapter 11 (Physical Protection)<\/strong><\/p>\n<p><b>Lab 7: Exploitation<\/b><\/p>\n<p><span style=\"color: #ff0000\"><strong>Milestone 2: Penetration test report draft due<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 175px\">\n<td style=\"width: 13.0924%;height: 175px\"><strong>Wednesday, 4\/8\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 175px\">\n<p>&nbsp;<\/p>\n<p>Risk assessment<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 175px\">\n<p><strong>Lab 8: Physical Security<\/strong><\/p>\n<p><strong>Lab 9: Social Engineering<\/strong><\/p>\n<p><strong>Quiz: \u201cCitizenfour\u201d film<\/strong><\/p>\n<p><b><span style=\"color: #ff0000\"><strong>Milestone 3: Penetration test report due (Due 1 Week from Comments)<\/strong><\/span><\/b><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 95px\">\n<td style=\"width: 13.0924%;height: 95px\"><strong>Wednesday, 4\/15\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 95px\">\n<p><span style=\"color: #000000\"><strong>Assign Milestone 5<\/strong><\/span><\/p>\n<p>Malware Analysis<\/p>\n<p>Risk case study: Maersk<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 95px\">\n<p><b><span style=\"color: #ff0000\"><strong>Milestone 4: Risk assessment report draft<\/strong><\/span><\/b><\/p>\n<p>Read Case Study:\u00a0<a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 13.0924%;height: 55px\"><strong>Wednesday, 4\/22\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 55px\">\n<p>&nbsp;<\/p>\n<p>Course wrap-up<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 55px\">\n<p><strong>Quiz: <\/strong>\u201cZero Days\u201d film.<\/p>\n<p><span style=\"color: #000000\"><b><strong>Lab 10: Web Privacy<\/strong><\/b><\/span><\/p>\n<p><strong>Lab 11: Malware Analysis (Extra Credit)<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 13.0924%;height: 55px\"><strong>Wednesday, 4\/29\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 55px\">\n<p>Final exam period begins<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 55px\">\n<p><strong>Final Exam (Online via Canvas)<\/strong><\/p>\n<p><strong><span style=\"color: #ff0000\">Milestone 5: Final risk assessment report due<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 13.0924%;height: 55px\"><strong>Tuesday, 5\/5\/2020<\/strong><\/td>\n<td style=\"width: 44.3229%;height: 55px\">\n<p>Last day of final exams<\/p>\n<\/td>\n<td style=\"width: 86.2641%;height: 55px\">\n<p><strong>\u00a0<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>DATES TOPIC Assignments Due (5:30pm Before Class) Wednesday, 1\/15\/2020 Introduction to the Course Threat Modeling Anderson, Ch. 1 Read the beginning of each chapter, skim the rest of the chapter: \u201cThreat Modeling,\u201d by Adam Shostack, Introduction, Chapter 1, Chapter 4 Optional:\u00a0Schneier, Chapter 21 Wednesday, 1\/22\/2020 Introduction to Linux | Google Cloud Platform (GCP) Introduction to [&hellip;]<\/p>\n","protected":false},"author":20390,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-22","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/users\/20390"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":62,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":463,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/22\/revisions\/463"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}