The subject of this course is to use the Honeynet/pot technologies as a tool to discover and learn existing and new threats to networked/distributed information system. The course includes a project to build a custom honeypot for security awareness to turn the theory into a practical approach to raise awareness about security issue. A section of the course is covering the aspect of "forensic analysis" and its implication in information security.
Given by : Alexandre Dulaunoy
|Sat. 09 January 2010 (9:00->12:00)/University of Luxembourg (Kirchberg)||Forensic Analysis, The Treachery of Images. Theory and Practices in Forensic Analysis.||Forensic Analysis - The Treachery of Images Supporting papers : Order of Volatility - Memory as Example,Password in memory,Flash and Forensic Analysis|
|Sat. 24 April 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg)||Honeypots and honeynets, a way to gather information about security attacks and the attackers.||An introduction to honeypot and honeynet technologies. Berkeley Packet Filter and Network Analysis. Support and data for the network analysis.|
|Sat. 8 May 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg)||Network scanning and discovery. Workshop about Wordpress security and the opportunities for the attackers.||Network and Services Discovery Conclusion - Learning from the attacker|
You may find that the subject is too experimental and not yet mature for real-life application. If you have any issue with the course (including the way I teach it), don't hesitate to talk about as soon as possible.