The subject of this course is to use the Honeynet/pot technologies as a tool to discover and learn existing and new threats to networked/distributed information system. The course includes a project to build a custom honeypot for security awareness to turn the theory into a practical approach to raise awareness about security issue. A section of the course is covering the aspect of "forensic analysis" and its implication in information security.
Given by : Alexandre Dulaunoy
Date/Where | Topic | Support |
---|---|---|
Sat. 09 January 2010 (9:00->12:00)/University of Luxembourg (Kirchberg) | Forensic Analysis, The Treachery of Images. Theory and Practices in Forensic Analysis. | Forensic Analysis - The Treachery of Images Supporting papers : Order of Volatility - Memory as Example,Password in memory,Flash and Forensic Analysis |
Sat. 24 April 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg) | Honeypots and honeynets, a way to gather information about security attacks and the attackers. | An introduction to honeypot and honeynet technologies. Berkeley Packet Filter and Network Analysis. Support and data for the network analysis. |
Sat. 8 May 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg) | Network scanning and discovery. Workshop about Wordpress security and the opportunities for the attackers. | Network and Services Discovery Conclusion - Learning from the attacker |
You may find that the subject is too experimental and not yet mature for real-life application. If you have any issue with the course (including the way I teach it), don't hesitate to talk about as soon as possible.