intellectual output...“investigating, developing and providing awareness about innovative lesson...
TRANSCRIPT
“Investigating, Developing And Providing
Awareness About Innovative Lesson
Syllabus Implemented in Cyber Security
Technologies in Information Technologies”
Intellectual Output – 3
“QR Code Table Related to Cyber Security”
COOPERATION FOR INNOVATION AND THE EXCHANGE OF GOOD PRACTICES
Strategic Partnerships for Vocational Education and Training
Project Number:2016-1-TR01-KA202-034434
This project has been funded with support from the European Commission. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
INTELLECTUAL OUTPUT – 3 Module-1 QR Codes Table
Number Subject Detail QR Code
1 Arp Protocol
Module-1 –Part - 1 Chapter: 1.6 Page: 11
Sample: 1.1.1 Linkhttps://youtu.be/_wtdPDKlzOY
2 Ping
Module-1 – Part -1 Chapter: 1.9.1 Page:14
Sample: 1.1.2 Link: https://youtu.be/a1f51Qn1AEs
3 Traceroute
Module-1 –Part -1 Chapter: 1.9.2 Page:15 Sample: 1.1.3 Link: https://youtu.be/WO24nHzCaS8
4 DNS Protocol
Module-1 –Part -1 Chapter: 1.11 Page:16 Sample : 1.1.4 Link: https://youtu.be/IzQblvH_eiE
5 Sniffing
Attacks
Module-1 – Part-1 Chapter: 2.15.1 Page:27 Sample:1.2.1 Link: https://youtu.be/UrAnR5tjeug
6 Vanilla Scan
Module-1 – Part -1 Chapter: 4.2.1 Page:45 Sample:1.4.1 Link: https://youtu.be/t4ytY7R4Ic8
7 SYN Scan
Module-1 – Part -1 Chapter: 4.2.1 Page:46 Sample:1.4.2 Link: https://youtu.be/D-n0ExnqwB4
8 XMAS and FIN Scan
Module-1 – Part -1 Chapter: 4.2.1 Page:46 Sample:1.4.3 Link: https://youtu.be/RtGR_ngGW4o
9 Vulnerability
Scanners
Module-1 – Part -1 Chapter: 4.2.3 Page:46 Sample:1.4.4 Link: https://www.scanmyserver.com/
10 IP Spoofing
Module-1- Part -1 Chapter: 4.3 Page:47 Sample:1.4.5 Link: https://youtu.be/CXF69ZOSJTU
11
Ping sweep
Module-1- Part -1 Chapter: 4.3 Page:47 Sample: 1.4 .6 Link: https://youtu.be/a1f51Qn1AEs
12
Network Attack –
Digital Attack Map
Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.7 Link: goo.gl/NKqxG9
13 Network Attack -
Norsecorp
Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.8 Link: http://map.norsecorp.com/
14 Network Attack -
Kaspersky
Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.9 Link: https://cybermap.kaspersky.com/
15 Virtual Private
Networks
Module-1- Part -1 Chapter: 4.3 Page:52 Sample: 1.4.10 Link: https://youtu.be/CXF69ZOSJTU
16 Whois
Module-1- Part -2 Chapter: 2.4 Page:15 Sample: 1.8.1 Link: https://youtu.be/Hq2xHdxoxD0
17 Regional
Module-1- Part -2 Chapter: 2.4 Page:16 Sample: 1.8.2 Link: https://youtu.be/h1-0ock1_Zw
18 Netcraft
Module-1- Part -2 Chapter: 2.4 Page:18 Sample: 1.8.3 Link: https://youtu.be/7oShhW9F2iA
19
Google Parameter
Search Example
Module-1- Part -2 Chapter: 2.4 Page:19 Sample: 1.8.4 Link: https://youtu.be/myQcnym6ZDM
20 Google Hacking
Database
Module-1- Part -2 Chapter: 2.4 Page:21 Sample: 1.8.5 Link: https://youtu.be/vztKUkBfqR0
21 Serversniff.net
Module-1- Part -2 Chapter: 2.5 Page:23 Sample: 1.8.6 Link: https://youtu.be/ZA4Uks2zepk
22 Hackertarget.
com
Module-1- Part -2 Chapter: 2.5 Page:23 Sample: 1.8.7 Link: https://youtu.be/IwVtXuCxCKQ
23 Wafw00f
Module-1- Part -2 Chapter: 2.6 Page:26 Sample: 1.8.8 Link: https://youtu.be/oE2poO9QOA0
24
Mx Record and Port
Information Query
Module-1- Part -2 Chapter: 2.6 Page:27 Sample: 1.8.9 Link: https://youtu.be/dSSSnwZ2UHk
25 Nmap
Command
Module-1- Part -2 Chapter: 2.9 Page:30 Sample: 1.8.10 Link: https://youtu.be/ZapO7BCbTuw
26 Zenmap
Module-1- Part -2 Chapter: 2.10.1 Page:31 Sample: 1.8.11 Link: https://youtu.be/1fIcHHPCTPg
27 nmap – Sp
Module-1- Part -2 Chapter: 2.10.2 Page:33 Sample: 1.8.12 Link: https://youtu.be/DZzIcvCIquY
28 nmap – v
Module-1- Part -2 Chapter: 2.10.2 Page:33 Sample: 1.8.13 Link: https://youtu.be/wX9KCkZoPyY
29 nmap – sV
Module-1- Part -2 Chapter: 2.10.2 Page:34 Sample: 1.8.14 Link: https://youtu.be/JWFVbZP7ZVw
30 nmap – O
Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.15 Link: https://youtu.be/QAvNW6fCCfc
31 Nmap -p -O -sV Parameter
Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.16 Link: https://youtu.be/4YQd4naywtM
32 Nmap Top
Ports
Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.17 Link: https://youtu.be/acF1xxqDAUg
33 Nmap File Writting
Module-1- Part -2 Chapter: 2.10.2 Page:36 Sample: 1.8.18 Link: https://youtu.be/TwfR-CV858Y
34 Cat Command
Module-1- Part -2 Chapter: 2.10.2 Page:36 Sample: 1.8.19 Link: https://youtu.be/ivIBoQViVpw
INTELLECTUAL OUTPUT – 3 Module-2 QR Codes Table
Number Subject Detail QR Code
1
How Mobility is Changing the Way We Live, Work, Play, and
Learn
Module-2 –Block - 1 https://www.youtube.com/watch?v=7c949LI9ZNs
Ref: Cisco network academy, Cisco and the New Normal
2
SATA vs SAS hard drives what’s the difference?
Module-2 –Block - 1 https://www.youtube.com/watch?v=zriUU5SuKOw&t=84s Ref: “SATA vs SAS Hard Drives Whats the Difference?” YouTube, YouTube, 8 Oct. 2013, www.youtube.com/watch?v=zriUU5SuKOw&t=84s.
3
Introduction to TCP/IP
Module-2 –Block - 2 https://www.youtube.com/watch?v=b9HafRqtVWc
Ref: lamonml. “Introduction to TCP/IP.” YouTube, YouTube, 11 Nov. 2015,
4
Computer Networks LANs and
WANs
Module-2 –Block - 2 https://www.youtube.com/watch?v=IxO4WQzdOfA
Ref: ahardinjr. “Computer Networks LANs and WANs.” YouTube, YouTube, 11 Sept. 2015, www.youtube.com/watch?v=IxO4WQzdOfA.
5
Hub, Switch or Router? Network Devices
Explained
Module-2 –Block - 2 https://www.youtube.com/watch?v=Ofjsh_E4HFY
Ref: PieterExplainsTech. “Hub, Switch or Router? Network Devices Explained.” YouTube, YouTube, 30 Jan. 2014,
6
Thin and Thick Clients
Module-2 –Block - 3
https://www.youtube.com/watch?v=Ay-uDaLV1NI
Ref: “Thin and Thick Clients.” YouTube, YouTube, 21 July 2016, www.youtube.com/watch?v=Ay-uDaLV1NI.
7
IP Addresses and
Subnetting
Module-2 –Block - 3
https://www.youtube.com/watch?v=rs39FWDhzDs
Ref: thenetworkingdoctors. “IP Addresses and Subnetting.” YouTube, YouTube, 30 Jan. 2012, www.youtube.com/watch?v=rs39FWDhzDs.
8
HP Elitebook Revolve Tablet
First Look
Module-2 –Block - 3
https://www.youtube.com/watch?v=ruAS3oKwnKU
Ref: notebooks. “HP Elitebook Revolve Tablet First Look.” YouTube, YouTube, 4 Dec. 2012, www.youtube.com/watch?v=ruAS3oKwnKU.
INTELLECTUAL OUTPUT – 3 Module-3 QR Codes Table
Number Subject Detail QR Code
1 Wireless Security:
Introduction
Module 3 Chapter:1 Page: 4 Issue: IEEE 802.11 Link: https://en.wikipedia.org/wiki/IEEE_802.11
2 CSMA/CA
Module 3 Chapter:1 Page: 5 Issue: Carrier-sense multiple access with collision avoidance Link: https://en.wikipedia.org/wiki/Carrier-sense_multiple_access_with_collision_avoidance
3 Types of wireless attacks
Module 3 Chapter:1 Page: 11 Issue: : Wireless security Link: https://en.wikipedia.org/wiki/Wireless_security
4 Firewalls:
Introduction
Module 3 Chapter:2 Page: 4 Issue: Firewall Link: https://en.wikipedia.org/wiki/Firewall_(computing)
5 Application
gateway firewalls
Module 3 Chapter:2 Page: 6 Issue: Application-level gateway Link: https://en.wikipedia.org/wiki/Application-level_gateway
6
Network Address Translation (NAT)
Module 3 Chapter:2 Page: 9 Issue: Network address translation Link: https://en.wikipedia.org/wiki/Network_address_translation
7 Firewall rules
Module 3 Chapter:3 Page: 10 Issue: Interaction with Other Firewall Rules Link: https://docs.microsoft.com/en-us/sql/sql-server/install/configure-the-windows-firewall-to-allow-sql-server-access?view=sql-server-2017#BKMK_other_rules
8 IDS
Module 3 Chapter:3 Page: 12 Issue: IDS/IPS Link: https://www.snort.org/
9 Incident
Response Procedures
Module 3 Chapter:4 Page: 6 Issue: NIST Special Publication 800-61 Revision 2 Link: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
INTELLECTUAL OUTPUT – 3 Module-4 QR Codes Table
Number Subject Detail QR Code
1
Network Security Layers:
Introduction
Module 4 Chapter:1 Page: 3 Issue: More Info: Layered security (techopedia.com). Link: https://www.techopedia.com/definition/4005/layered-security
2
Network Security Layers:
Introduction
Module 4 Chapter:1 Page: 4 Issue: More Info: Defence In-Depth (SANS Institute). Link: https://www.sans.org/security-resources/glossary-of-terms/.
3
Network Security Layers:
Introduction
Module 4 Chapter:1 Page: 4 Issue: More Info: Defence In-Depth (techopedia.com) Link:https://www.techopedia.com/definition/16509/defense-in-depth.
4
Network Security Layers:
Introduction
Module 4 Chapter:1 Page: 5 Issue: More Info: Multi-layer Defence In-Depth approach (SANS). Link:https://www.sans.org/reading-room/whitepapers/protocols/applying-osi-layer-network-model-information-security-1309
5 Mantraps
Module 4 Chapter:1 Page: 6 Issue: More Info: Mantrap tailgating prevented (newtonsecurityinc.com). Link: https://youtu.be/g2SRmwyzLtY
6 Mantraps
Module 4 Chapter:1 Page:7 Issue: More Info: Security interlock control system (recorduk.co.uk). Link: https://www.youtube.com/watch?v=C7K7PhuZSkU
7 Alarm
Module 4 Chapter:1 Page:12 Issue: Practice: Windows login notification Link: https://youtu.be/drZYb8yooYQ
8 Linux Security Components
Module 4 Chapter:2 Page:4 Issue: More info: Linux and the GNU System (GNU Operating system) Link: Linux and the GNU System (http://www.gnu.org/gnu/linux-and-gnu.en.html)
9 Linux Security Components
Module 4 Chapter:2 Page:5 Issue: More info: What is GNU/Linux? Link: https://www.debian.org/releases/jessie/amd64/ch01s02.html.en
10 Basic Unix
security
Module 4 Chapter:2 Page:5 Issue: More info: GNU Manifesto Link: http://www.gnu.org/gnu/manifesto.en.html
11
Permissions
Module 4 Chapter:2 Page:7 Issue: More info: “Introduction to Linux” (tldp.org) Link: http://www.tldp.org/LDP/intro-linux/html/sect_03_04.html
12 Software
management
Module 4 Chapter:2 Page:8 Issue: Practise: Software management Link: https://youtu.be/mhdtFid7GXg
13 Passwords
Module 4 Chapter:2 Page:10 Issue: More info: Normal UNIX authentication (debian.org) Link: https://www.debian.org/doc/manuals/debian-reference/ch04.en.html#_normal_unix_authentication
14 Passwords
Module 4 Chapter:2 Page:10 Issue: Practise: Passwords Link: https://youtu.be/k3IIV7BZS6g
15 Limiting root
access
Module 4 Chapter:2 Page:10 Issue: Practise: Limiting root access Link: https://youtu.be/kSBxN2oAr1I
16 Setting login, process and
memory limits
Module 4 Chapter:2 Page:11 Issue: Practise: Setting login, process and memory limits Link: https://youtu.be/jtCCbZCVbZc
17 Configuring
SSH
Module 4 Chapter:2 Page:12 Issue: More info: ssh command manpages (debian.org) Link: https://manpages.debian.org/stretch/openssh-client/ssh.1.en.html
18 Configuring
SSH
Module 4 Chapter:2 Page:12 Issue: More info: The ssh configuration file manapges (debian.org) Link: https://manpages.debian.org/stretch/openssh-client/ssh_config.5.en.html
19 GPG
encryption
Module 4 Chapter:2 Page:13 Issue: Practise: GPG encryption Link: https://youtu.be/OiPAi8QkCB8
20
FHS (File System
Hierarchy Standard)
Module 4 Chapter:2 Page:13 Issue: More info: Filesystem Hierarchy Standard (FHS Link: : http://www.pathname.com/fhs/
21
Linux files used to manage network functions
Module 4 Chapter:2 Page:18 Issue: More info: Linux Debian basic network infrastructure (debian.org) Link: https://www.debian.org/doc/manuals/debian-reference/ch05.en.html#_the_basic_network_infrastructure
22
EFS
(Encrypting
File System)
Module 4 Chapter:2 Page:20 Issue: More info: cipher.exe utility on Windows environment (technet.microsoft.com
Link: https://technet.microsoft.com/en-us/library/cc771346(v=ws.11).aspx
23
BitLocker
Drive
Encryption
Module 4 Chapter:2 Page:20 Issue: More info: Bitlocker (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/hh831713(v=ws.11).aspx
24 BitLocker
Drive Encryption
Module 4 Chapter:2 Page:20 Issue: More info: BitLocker Drive Encryption Overview (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc732774(v=ws.11).aspx
25 UAC (User Account Control)
Module 4 Chapter:2 Page:22 Issue: More info: User Account Control overview (Microsoft) Link: https://technet.microsoft.com/en-us/library/jj574089(v=ws.11).aspx
26 UAC (User Account Control)
Module 4 Chapter:2 Page:22 Issue: Practise: User Account Control Step-by-Step Guide (Microsoft) Link:
27 Active
directory
Module 4 Chapter:2 Page:23 Issue: More info: Rights Management Services (AD RMS) (technet.microsoft.com) Link: https://technet.microsoft.com/library/hh831364
28
Windows server
authentication methods
Module 4 Chapter:2 Page:26 Issue: More info: Windows authentication methods (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/hh831472(v=ws.11).aspx#Anchor_1
29 NTLM
authentication
Module 4 Chapter:2 Page:27 Issue: More info: NTLM Authentication protocol (msdn.microsoft.com) Link: https://msdn.microsoft.com/en-us/library/cc236621.aspx
30 Kerberos
authentication
Module 4 Chapter:2 Page:28 Issue: More info: Microsoft Kerberos (msdn.microsoft.com) Link: https://msdn.microsoft.com/en-us/library/windows/desktop/aa378747(v=vs.85).aspx.
31 Security
Configuration Wizard (SCW)
Module 4 Chapter:2 Page: 30 Issue: More info: Server Hardening - Windows Server 2012 (Microsoft Security TechCenter) Link: https://technet.microsoft.com/en-us/security/jj720323.aspx
32 Security
Configuration Wizard (SCW)
Module 4 Chapter:2 Page:30 Issue: More info: Windows Security Configuration Wizard (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc754997.aspx
33 Secedit and
security templates
Module 4 Chapter:2 Page:32 Issue: More info: secedit utility (technet.microsoft.com) Link: https://technet.microsoft.com/library/hh875548.aspx
34 GPUpdate
Module 4 Chapter:2 Page:33 Issue: More info: Gpupdate utility (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/bb490983.aspx
35 Group Policy
troubleshooting
Module 4 Chapter:2 Page:34 Issue: More info: Gpresult utility (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc733160.aspx
36 AppLocker
Module 4 Chapter:2 Page:34 Issue: More info: Administer Software Restriction Policies (SRP) Link: https://technet.microsoft.com/en-us/library/hh994606.aspx
37 VLAN
Module 4 Chapter:3 Page:6 Issue: More info: Understanding and Configuring VLANs – Overview of VLANs (Cisco) Link: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vlans.html#wp1020364
38 802.1x
Module 4 Chapter:3 Page:9 Issue: More info: Implementation IEEE 802.1x for Wired Networks (SANS) Link: https://www.sans.org/reading-room/whitepapers/access/implementing-ieee-8021x-wired-networks-34520
39 Software failures
Module 4 Chapter:4 Page:5 Issue: More info: Murphy’s law (Wikipedia) Link: https://en.wikipedia.org/wiki/Murphy%27s_law
40
Software Quality
Assurance (SQA)
Module 4 Chapter:4 Page:8 Issue: More info: What is Software Quality Assurance? (Dr. Linda H. Rosenberg – NASA) Link: http://static1.1.sqspcdn.com/static/f/702523/9339442/1289318061700/200205-Rosenberg.pdf?token=fvXptKFsZM%2BSstvUEn5PKoL5S2I%3D
41 Computerised
SCM tools
Module 4 Chapter:4 Page:12 Issue: More info: 828-2012 IEEE Standard for Configuration Management in Systems and Software Engineering. 2012. (IEEE Xplore Digital Library) Link: http://ieeexplore.ieee.org/document/6170935/?reload=true
42 Computerised
SCM tools
Module 4 Chapter:4 Page:12 Issue: More info: Software Configuration Management Link: https://www.youtube.com/watch?v=AaHaLjuzUm8
43 RSA algorithm
Module 4 Chapter:5 Page:7 Issue: More info: RSA Operation (Wikipedia) Link: https://simple.wikipedia.org/wiki/RSA_(algorithm)#Operation
44 Securing the e-
mail process
Module 4 Chapter:5 Page:10 Issue: More info: Announcement of the European Court of Human Rights about the Article 8 of the Convention Link: http://www.echr.coe.int/Documents/Press_Q_A_Barbulescu_ENG.PDF
45 Database
encryption
Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (New York Times) Link: https://www.nytimes.com/2017/09/14/business/equifax-hack-what-we-know.html
46 Database
encryption
Module 4 Chapter:6 Page: 13 Issue: More info: Hack of the credit firm Equifax in 2017 (The Guardian) Link: https://www.theguardian.com/technology/2017/sep/19/equifax-credit-firm-march-breach-massive-may-hack-customers
47 Database
encryption
Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (BBC) Link: http://www.bbc.com/news/business-41575188
48 Database
encryption
Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (Databreaches.net) Link: https://www.databreaches.net/equifax-umm-actually-hackers-stole-records-of-15-2-million-brits-not-400000/
49 Database
encryption
Module 4 Chapter:6 Page:15 Issue: More info: Security Stored Data Using Transparent Data Encryption (Microsoft)
Link: https://technet.microsoft.com/en-us/library/bb934049(v=sql.110).aspx
50 Database
encryption
Module 4 Chapter:6 Page:15 Issue: More info: Security Stored Data Using Transparent Data Encryption (Oracle) Link: https://docs.oracle.com/cd/E11882_01/network.112/e40393/asotrans.htm#ASOAG600
INTELLECTUAL OUTPUT – 3 Module-5 QR Codes Table
Number Subject Detail QR Code
1
Introduction to Cloud
Computing
Module 5
Chapter 1, page 5
What is Cloud Computing
https://www.youtube.com/watch?v=uYGQcmZUTaw
2
Cloud Computing Essential
characteristics
Module 5
Chapter 1, page 7
Cloud Computing fundamentals
https://www.youtube.com/watch?v=uroryFU78gM
3
Cloud Computing
Service models
Module 5
Chapter 1, page 9
Cloud Computing Service models
https://www.youtube.com/watch?v=36zducUX16w
4
Cloud Computing deployment
models
Module 5
Chapter 1, page 13
Cloud Computing deployment models
https://www.youtube.com/watch?v=3WIJ4axzFlU
5
Cloud Computing
Security
Module 5
Chapter 2, page 15
Cloud Cumputing Security
https://www.youtube.com/watch?v=L-cC-JjYos0
6
Cloud Computing
Security
Module 5
Chapter 3, page 22
Security issues in Cloud Computing
https://www.youtube.com/watch?v=wI84CjHMKhk
7
Cloud Computing
management plane
Module 5
Chapter 4, page 26
What is Management Plane?
https://www.youtube.com/watch?v=YC-8vmf5ibk
8
Management plane and Business
Continuity
Module 5
Chapter 4, page 29
Business continuity in the Age of Cloud
https://www.youtube.com/watch?v=GH5B5HjUN6E
9
Cloud Computing
Infrastructure Security
Module 5
Chapter 5, page 31
Introduction to Infrastructure Security
https://www.youtube.com/watch?v=jaL2t934DN0
10
Cloud Infrastructure Virtualisation
Module 5
Chapter 5, page 31
Introduction to Virtualisation
https://www.youtube.com/watch?v=HFQdbOY8Ams
11
Immutable Infrastructure
Module 5
Chapter 5, page 39
Introduction to Immutable Infrastructure
https://www.youtube.com/watch?v=Ogtt2bETNZM
12 Security of
Cloud Storage
Module 5
Chapter 5, page 43
Issues in Cloud Storage Security
https://www.youtube.com/watch?v=55jdSe7Ro68
13
Virtualisation and
Containers
Module 5
Chapter 6, page 44
Containers Explained
https://www.youtube.com/watch?v=eLmUlR_1DMI
Please visit project web site and download this QRs
www.cybersecurityplus.org