• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Arkadiy Kantor

How To Find Cybersecurity Vulnerabilities Across Your Environment

April 15, 2017 by Arkadiy Kantor Leave a Comment

How To Find Cybersecurity Vulnerabilities Across Your Environment

 

This article is written by a former CTO who talks about how he managed security at his data center. He talked about the “shotgun test” which is a test to see what you could destroy to do the most damage if you only had one bullet. He wanted to find something equivalent to test cybersecurity. He later suggests that’s Nessus vulnerability scanner might be the closest thing you can do to the shotgun test. He also emphasized the importance of having a balanced security portfolio and spend money wisely on diverse and appropriate security strategies.

 

https://www.forbes.com/sites/danwoods/2017/04/14/how-to-find-cybersecurity-vulnerabilities-across-your-environment/#14e753c4878a

Private Cyber Security Insurance

April 9, 2017 by Arkadiy Kantor Leave a Comment

Insurance giant AIG has recently started selling “personal cyber security insurance”. Corporate cyber security insurance has been around for a while with interesting consequences. Making claims has often been difficult for customers because of the way that the policies are written. This is a very interesting concept for a private individual because it will be hard to determine damages from certain attacks. Not all attacks result in the loss of money or can be directly associated with a cash theft. How do you value someone’s privacy in the example of an email breach or a social media breach?

It sounds like AIG is currently just targeting the wealthy with this product but it will be interesting to see how this will progress in the near future as we become far more dependent on the internet and the product will have to trickle down to the mainstream.

 

http://fortune.com/2017/04/08/cyber-security-insurance-cybersecurity-aig-2017-tools-news/

Approach to Security

March 24, 2017 by Arkadiy Kantor 1 Comment

I thought this article was interesting because it focused on the social aspect of security. It talks about how most people are not aware of suber security risks and they are not properly trained. The Article suggests that we have a dangerous mindset about cyber security and it can pose a huge threat. Despite all the recent major breaches in both the private and political sectors people have very little knowledge or self-awareness of the security implications. I think these are very good points and people are relying on technology to protect themselves from threats which leaves us very vulnerable to social threats.

http://www.slate.com/articles/technology/future_tense/2017/03/why_america_s_current_approach_to_cybersecurity_is_so_dangerous.html

March 5, 2017 by Arkadiy Kantor Leave a Comment

Metasploit Presentation

Metaploit Summary

https://community.mis.temple.edu/mis5212sec001sp2017/2017/03/05/3344/

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in