• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Christie L Vazquez

News Article – Week 14

May 6, 2018 by Christie L Vazquez Leave a Comment

https://thehackernews.com/2018/05/intel-spectre-vulnerability.html

Additional vulnerabilities in Intel’s chip. Same design flaw as Spectre. As the industry finds more vulnerabilities, chip makers do not know if the patches will cause performance issues.

News Article -Week 10

May 6, 2018 by Christie L Vazquez Leave a Comment

https://thehackernews.com/2018/05/windows-docker-containers.html

Microsoft released an out of band emergency patch last week for a vulnerability in its Windows Host Compute Service. The vulnerability allows an attacker to remotely execute code on the victim’s host machine.

Week 08- News Article

April 3, 2018 by Christie L Vazquez Leave a Comment

https://www.bloomberg.com/news/articles/2018-04-02/energy-transfer-says-cyber-attack-shut-pipeline-data-system

Cyber attack against a pipeline company. Although only impacting data transfers, their stock price dropped 2.5% due to the news of the attack.

News Article – Week 6

March 23, 2018 by Christie L Vazquez Leave a Comment

https://thehackernews.com/2018/03/window-remote-assistance.html

A new vulnerability affecting WIN2012, 2016 and 2008, WIN 10, 8 and 7 allows remote attackers to steal sensitive. Not only do you need to be suspicious of giving access to your computer and a of the person’s machine whom is connecting to you.

Week 5 – News Article

March 18, 2018 by Christie L Vazquez 1 Comment

A recent Forbes article mentions 68% of senior IT professions do not think their boards are being briefed on mitigating controls for cyber risks. I was surprised by the percentage. Either companies are not managing up, or down, or are not doing enough to mitigate cyber risk.

https://www.forbes.com/sites/gilpress/2018/03/15/cybersecurity-by-the-numbers-market-estimates-forecasts-and-surveys/#5b079c3212c4

Week 4- News Article

February 24, 2018 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/vulnerabilities—threats/anatomy-of-an-attack-on-the-industrial-iot-/a/d-id/1331097

This article details an attack on an IoT device. Similar to the kill chain, the attacker follows a recon, development, execution and command and control phase. Reminds the vulnerabilities with IoTs supporting critical infrastructure.

Week 3- News Article

February 24, 2018 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/careers-and-people/best-practices-for-recruiting-and-retaining-women-in-security/d/d-id/1331114

The article introduces a few best practices, according to Forrester Research, to help reduce the gender gap in the cybersecurity field.

Women represent 15- 20% of the industry. However that includes risk management functions.

Recruit from academic institutions with a higher enrollment of women, Mentoring programs and Sponsor, recruit from diverse security events are a few examples.

Week 1 – News Article

February 9, 2018 by Christie L Vazquez 1 Comment

Companies in the UK that fail to protect themselves effectively from hackers could be fined up to £17m.

http://www.bbc.com/news/technology-42861676?intlink_from_url=http://www.bbc.com/news/topics/cz4pr2gd85qt/cyber-security&link_location=live-reporting-story

The UK government is cracking down on cyber malpractice. The article states if companies fail to protect themselves from cyber crimes they will be fined.

Due to the data and services energy, transport, water and health companies provide, they are expected to have the most robust safeguards. Under a new government directive the cyber security practices at these companies will be inspected by regulators.

Primary Sidebar

Weekly Discussions

  • Uncategorized (10)
  • Week 01 (18)
  • Week 02 (9)
  • Week 03 (13)
  • Week 04 (17)
  • Week 05 (12)
  • Week 06 (16)
  • Week 07 (2)
  • Week 08 (8)
  • Week 09 (5)
  • Week 10 (10)
  • Week 11 (5)
  • Week 12 (5)
  • Week 13 (2)
  • Week 14 (7)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in