{"id":367,"date":"2019-08-29T20:25:30","date_gmt":"2019-08-30T00:25:30","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/?page_id=367"},"modified":"2020-01-07T14:29:07","modified_gmt":"2020-01-07T19:29:07","slug":"labs","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/labs\/","title":{"rendered":"Labs"},"content":{"rendered":"<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_threat_modeling.html\">Lab: Threat Modeling with Attack Trees<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_hashing_and_symmetric_encryption.html\">Lab: Symmetric Encryption and Hashing<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_asymmetric_encryption.html\">Lab: Asymmetric Encryption<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_digital_certificates.html\">Lab: Digital Certificates<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_password_cracking.html\">Lab: Password Cracking<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_vulnerability_scanning.html\">Lab: Vulnerability Scanning<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_exploitation.html\">Lab: Exploitation<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_physical_security_scavenger_hunt.html\">Lab: Physical Security Scavenger Hunt<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_social_engineering.html\">Lab: Social Engineering<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_security_onion.html\">Lab: Network Security Monitoring and Security Onion<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_malware.html\">Lab: Malware Analysis<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/labs\/lab_web_privacy_and_anonymity.html\">Lab: Web Privacy and Anonymity<\/a><\/p>\n<h2 id=\"tutorials\">Tutorials<\/h2>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/tutorials\/intro-to-linux.html\">Tutorial: Introduction to Linux<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/tutorials\/intro-to-linux-cowsay.html\">Tutorial: Introduction to Linux \u2013 Supplemental Cowsay Miniadventure<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/tutorials\/intro-to-gcp.html\">Tutorial: Introduction to Google Cloud Platform<\/a><\/p>\n<p><a href=\"https:\/\/anthonyvance.com\/security-assignments\/tutorials\/intro-to-networking.html\">Tutorial: Introduction to Networking<\/a><\/p>\n<h2 id=\"lab-supplementary-files\">Lab Supplementary Files<\/h2>\n<p><a href=\"https:\/\/github.com\/deargle\/security-assignments\/tree\/master\/labs\/files\">Hosted on github, here.<\/a> To download any one of them, click its link on that page, and then click \u201cDownload.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lab: Threat Modeling with Attack Trees Lab: Symmetric Encryption and Hashing Lab: Asymmetric Encryption Lab: Digital Certificates Lab: Password Cracking Lab: Vulnerability Scanning Lab: Exploitation Lab: Physical Security Scavenger Hunt Lab: Social Engineering Lab: Network Security Monitoring and Security Onion Lab: Malware Analysis Lab: Web Privacy and Anonymity Tutorials Tutorial: Introduction to Linux Tutorial: Introduction [&hellip;]<\/p>\n","protected":false},"author":20390,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-367","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/users\/20390"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/367\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/367\/revisions\/386"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/media?parent=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}