Course Schedule
Date | Lecture Topic | Assignment Activity | Reading |
5/11/2015 | Intro to Intrusion Detection & Concepts | Chapters 1 – 2 | |
5/13/2015 | Intrusion Detection Concepts – Continued: Team Members, Roles, Activities, responsibilities. Introduction to IOCs (Indicators of Compromise) | Chapters 3 – 5 | |
5/18/2015 | Indicators of Compromise – Development, IDS – Signature Based and Anomaly Based. | Quiz – Material Week 1, Reading Summary – Week 2 | Introduction to Intrusion Detection and Prevention Systems (NIST SP 800-94,
Network IDS and IPS Deployment Strategies, by Nicholas Pappas Using IOCs in Malware Forensics by Hun-Ya Lock |
5/20/2015 | Deployment of IDS and IPS Continued | ||
5/25/2015 | Memorial Day – No Lecture | https://www.youtube.com/watch?v=l2w-fbyy6y0
https://www.youtube.com/watch?v=RUmYojxy3Xw |
|
5/27/2015 | Tools and Technology (ie. Snort, Splunk, etc.) | Quiz – Material Week 2, Video – Summary – Week 3 | TBD |
6/1/2015 | Log Collection and Investigating Network and Enterprise Technology | Quiz – Material Week 3, Reading Summary – Week 4 | Chapter 10 – Chapter 12 |
6/3/2015 | Log Collection and Investigating Network and Enterprise Technology – Continued | Chapter 8 – Chapter 9 | |
6/8/2015 | Detecting Intrusions | Quiz – Material Week 4, Reading Summary – Week 5 | TBD |
6/10/2015 | Computer Forensics Concepts | Term Paper Due | TBD |
6/15/2015 | Intrusion Detection in an Outsourced Environment | Reading Summary Week 6 | TBD |
6/17/2015 | FINAL EXAM | FINAL EXAM |
Leave a Reply