GithubHelp home page GithubHelp logo

kea-soft-sec's Introduction

#KEA/Softwaresikkerhed

Softwaresikkerhed MOC

Softwaresikkerhed er en del af KEAs Diplomuddannelse i [[Diplom i IT-sikkerhed]].

Oversigt over kursusgange

[[Kursusgang 0]] - Welcome, goals and expectations Prepare Virtual Machines - bring laptop

Create a good starting point for learning Introduce lecturer and students Concrete Expectations Prepare tools for the exercises

[[Kursusgang 1]] - Lab setup and Programming Knowledge

Do some initial programming

[[Kursusgang 3]] - Initial Overview of Software Security

Get an overview of the subject

[[Kursusgang 4]] - SDLC and risk ranking

[[Kursusgang 5]] - Web Application Security: Recon

[[Kursusgang 6]] - Web Application Security: Recon and Offensive

[[Kursusgang 7]] - Hacking Web Applications: Offensive

[[Kursusgang 8]] - Software Programming & Memory Corruption

[[Kursusgang 9]] - Program Building blocks and exploitation

[[Kursusgang 10]] - Strings and Pointers

[[Kursusgang 11]] - Network Attacks Intro

[[Kursusgang 12]] - Fuzzing intro

[[Kursusgang 13]] - Security Design and Defense

[[Kursusgang 14]] - General questions and summary

We will do a practice exam and talk about exam subjects.


Goals

The module is centered around software security including software quality, software flaws, vulnerabilities, software APIs, error handling and software architecture.

Teaching material will primarily be English, but the teaching will be in Danish.

See more about the course in the official curriculum which can be downloaded from the main page https://kompetence.kea.dk/uddannelser/it-digitalt/diplom-i-it-sikkerhed

  • near the top "Download studieordningen".

Exam

Date 26/10 2021

Teaching Methods

  • Lecture lessons

  • Group exercises and cases, including practical exercises with laptop

Teaching dates - fall 2021

31/8, 2/9, 7/9, 9/9, 14/9, 16/9, 21/9, 23/9, 28/9, 30/10, 5/10, 7/10, 12/10, 14/10

Make sure to mark dates in your calendar - some weeks will have lessons tuesday/thursdays.

Hardware

Since we are going to be doing exercises, each team will need two virtual machines.

The following are two recommended models:

  • One based on Debian, running software servers and web applications

  • One based on Kali Linux, running attacks against software

Read more about these at https://github.com/kramse/kramse-labs

Course reading list

This course uses three books and a number of supporting resources.

Primary literature:

  • The Art of Software Security Testing Identifying Software Security Flaws,

    Chris Wysopal, 2006, ISBN: 9780321304865, named AoST or the Green Book

  • Web Application Security, Andrew Hoffman, 2020, ISBN: 9781492053118 called WAS below

  • Hacking, 2nd Edition: The Art of Exploitation, Jon Erickson, February 2008, ISBN-13: 9781593271442, called just hacking below

It is recommended to buy the Pwning OWASP Juice Shop Official companion guide to the OWASP Juice Shop.

From https://leanpub.com/juice-shop - suggested price USD 5.99

It is recommended to buy these books listed above.

Supporting literature:

  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, Michael Howard, David LeBlanc, John Viega, ISBN: 9780071626750, 2010 The McGraw-Hill Companies, named 24-deadly below

    Additional software security problems, listed language agnostically and with small examples. Highly recommended for programmers.

  • Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb, December 2018, 248 pp. ISBN-13: 978-1-59327-855-7 - shortened LBfH

    This book introduces the Linux operating system commands, using Kali Linux as example. The tools presented include a lot of generic Unix tools. If you have no experience with Linux or Unix it is recommended to buy this book.

  • Kali Linux Revealed Mastering the Penetration Testing Distribution https://www.kali.org/download-kali-linux-revealed-book/ - shortened KLR

We will also use the OWASP Juice Shop Tool Project as a running example. This is an application which is modern AND designed to have security flaws.

Read more about this project at https://www.owasp.org/index.php/OWASP_Juice_Shop_Project and https://github.com/bkimminich/juice-shop

Supporting Internet resources

Also the course will use internet links and pages. These can be downloaded from the internet often for free and may be gathered by the instructor for easy download.

System Design and Architecture

Control Hijacking Attacks

OS Security and secure coding

Exploiting Hardware Bugs and Crypto Related

kea-soft-sec's People

Contributors

krejac avatar

Watchers

James Cloos avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.