January 19th, 2021
We will use the textbook as our guide but need to think critically about:
Computer Security Fundamentals, 4th Edition, Dr. Chuck Easttom, 2020. Course Text
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition by Darril Gibson; James M Stewart; Mike Chapple Published by Sybex, 2018.
Learn Kali Linux 2019, Glen D. Singh, Packt Publishing, November 2019, ISBN: 9781789611809.
So many to remember and look up
We need to be familiar with a reasonable sample of famous and/or recent attacks
We’ll use the very well produced and entertaining Darknet Diaries podcast
Approximately one podcast per week will be assigned for you to listen to.
Suggestions for other sources of cases studies are welcome.
We may write some small programs to illustrate some core concepts
You may use Python
No other languages will be accepted
You will learn how to set up SSH public and private keys for working with remote servers as part of public key cryptography
We run symmetric encryption algorithms via GnuPG
Set up a “web of trust” based public key infrastructure for secure emails with classmates
To gain and share more in depth and up to date knowledge in an important area of cybersecurity.
From Google Technical Writing:
Comedy writers seek the funniest results, horror writers strive for the scariest, and technical writers aim for the clearest. In technical writing, clarity takes precedence over all other rules.