{"id":409,"date":"2020-09-03T12:27:21","date_gmt":"2020-09-03T16:27:21","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/?page_id=409"},"modified":"2026-03-31T13:04:22","modified_gmt":"2026-03-31T17:04:22","slug":"lecture-materials","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/lecture-materials\/","title":{"rendered":"Lecture Materials"},"content":{"rendered":"<p>Lecture Slides (posted after class)<\/p>\n<ul>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/08\/MIS4596_Class01_IntroductionToTheCourse.pptx\">MIS4596_Class01_IntroductionToTheCourse<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/08\/MIS4596_Class02_ThreatModelingA-Darin-Surface-Pro.pdf\">MIS4596_Class02_ThreatModelingA-Darin-Surface-Pro<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/01\/MIS4596_Class03_Risk-Assessment.pptx\">MIS4596_Class03_Risk Assessment<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2026\/02\/MIS4596_Class05_DataPrivacy-student.pdf\">MIS4596_Class05_DataPrivacy &#8211; student<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2026\/02\/MIS4596_Class06_IntroToCryptography.pdf\">MIS4596_Class06_IntroToCryptography<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/02\/MIS4596_Class08_SymmetricBlockCiphersHashing.pptx\">MIS4596_Class08_SymmetricBlockCiphers&amp;Hashing<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/02\/MIS4596_Class10_Asymmetric-Cryptography-and-Signatures.pptx\">MIS4596_Class10_Asymmetric Cryptography and Signatures<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/02\/MIS4596_Class11_Digital-CertificatesPKI.pptx\">MIS4596_Class11_Digital Certificates&amp;PKI<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class12_Authentication-and-passwords.pptx\">MIS4596_Class12_Authentication and passwords<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class13_PasswordCracking-A.pptx\">MIS4596_Class13_PasswordCracking-A<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class14_Vulnerability-Scanning.pptx\">MIS4596_<\/a><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class14_Vulnerability-Scanning.pptx\">Class14_Vulnerability Scanning<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class15_Vulnerability-Exploitation.pptx\">MIS4596<\/a><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/03\/MIS4596_Class15_Vulnerability-Exploitation.pptx\">Class15_Vulnerability Exploitation<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/11\/MIS4596_Class16_HumanElement.pdf\">MIS4596_Class16_HumanElement<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/11\/MIS4596_Class17_PhysicalSecurity.pdf\">MIS4596_Class17_PhysicalSecurity<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/04\/MIS4596_Class18_MalwareAnalysis.pptx\">MIS4596_Class18_MalwareAnalysis<\/a><\/li>\n<li><a href=\"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/files\/2025\/04\/MIS4596_Class19_Network-Security-Monitoring-and-Incident-Response_A.pptx\">MIS4596_Class19_Network Security Monitoring and Incident Response_A<\/a><\/li>\n<\/ul>\n<p>_________<\/p>\n<p>_________________________________________________________________________________________<\/p>\n<p>Other resources:<\/p>\n<ul>\n<li>An OpenSSL Manual is available\u00a0<a href=\"https:\/\/community.mis.temple.edu\/mis4596sec001spring2022\/files\/2022\/02\/openssl.pdf\">here<\/a>\u00a0\u2013 for commands for hashing look at chapter 2<\/li>\n<li>A Linux Fundamentals guidebook is available\u00a0<a href=\"https:\/\/community.mis.temple.edu\/mis4596sec001spring2022\/files\/2022\/02\/linuxfundamentals.pdf\">here<\/a><\/li>\n<li>Hydra manual <a href=\"https:\/\/www.systutorials.com\/docs\/linux\/man\/1-hydra\/\">here<\/a><\/li>\n<li>Hashcat manual <a href=\"https:\/\/hashcat.net\/wiki\/doku.php?id=hashcat\">here<\/a><\/li>\n<li>John the Ripper manual <a href=\"https:\/\/www.openwall.com\/john\/doc\/\">here<\/a><\/li>\n<li>Hash analyzer manual <a href=\"https:\/\/www.tunnelsup.com\/hash-analyzer\/\">here<\/a><\/li>\n<li>Sudo manual <a href=\"https:\/\/man7.org\/linux\/man-pages\/man8\/sudo.8.html\">here<\/a><\/li>\n<li>Nmap manual <a href=\"https:\/\/nmap.org\/book\/man.html\">here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Lecture Slides (posted after class) MIS4596_Class01_IntroductionToTheCourse MIS4596_Class02_ThreatModelingA-Darin-Surface-Pro MIS4596_Class03_Risk Assessment MIS4596_Class05_DataPrivacy &#8211; student MIS4596_Class06_IntroToCryptography MIS4596_Class08_SymmetricBlockCiphers&amp;Hashing MIS4596_Class10_Asymmetric Cryptography and Signatures MIS4596_Class11_Digital Certificates&amp;PKI MIS4596_Class12_Authentication and passwords MIS4596_Class13_PasswordCracking-A MIS4596_Class14_Vulnerability Scanning MIS4596Class15_Vulnerability Exploitation MIS4596_Class16_HumanElement MIS4596_Class17_PhysicalSecurity MIS4596_Class18_MalwareAnalysis MIS4596_Class19_Network Security Monitoring and Incident Response_A _________ _________________________________________________________________________________________ Other resources: An OpenSSL Manual is available\u00a0here\u00a0\u2013 for commands for hashing look at chapter 2 A [&hellip;]<\/p>\n","protected":false},"author":3172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-409","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/users\/3172"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":346,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/409\/revisions"}],"predecessor-version":[{"id":1298,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/409\/revisions\/1298"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/media?parent=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}