CNIT 40: DNS Security DNS is crucial for all Internet transactions, but it is subject to numerous security risks, including phishing, hijacking, packet amplification, spoofing, snooping, poisoning, and more. Learn how to configure secure DNS servers, and to detect malicious activity with DNS monitoring. We will also cover DNSSEC principles and deployment. Students will perform hands-on projects deploying secure DNS servers on both Windows and Linux platforms.
CNIT 120 - Network Security Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 121 - Computer Forensics The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Prepares for part of the industry standard certification exam, Security+, and also maps to the Computer Investigation Specialists exam.
CNIT 123 - Ethical Hacking and Network Defense Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
CNIT 124 - Advanced Ethical Hacking Advanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks.
CNIT 126 - Practical Malware Analysis Learn how to analyze malware, including computer viruses, trojans, and rootkits, using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools.
CNIT 127 - Exploit Development Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.
CNIT 128 - Hacking Mobile Devices Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal.
CNIT 129S: Securing Web Applications Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code.
CNIT 140: IT Security Practices Training students for cybersecurity competitions, including CTF events and the Collegiate Cyberdefense Competition (CCDC). This training will prepare students for employment as security professionals, and if our team does well in the competitions, the competitors will gain recognition and respect which should lead to more and better job offers.
Florida State University's - Offensive Network Security This class allows students to look deep into know protocols (i.e. IP, TCP, UDP) to see how an attacker can utilize these protocols to their advantage and how to spot issues in a network via captured network traffic. The first half of this course focuses on know protocols while the second half of the class focuses on reverse engineering unknown protocols. This class will utilize captured traffic to allow students to reverse the protocol by using known techniques such as incorporating bioinformatics introduced by Marshall Beddoe. This class will also cover fuzzing protocols to see if the server or client have vulnerabilities. Overall, a student finishing this class will have a better understanding of the network layers, protocols, and network communication and their interaction in computer networks.
Florida State University's - Offensive Computer Security The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary, an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing and secure system administration.
NYU Tandon School of Engineering - OSIRIS Lab's Hack Night Developed from the materials of NYU Tandon's old Penetration Testing and Vulnerability Analysis course, Hack Night is a sobering introduction to offensive security. A lot of complex technical content is covered very quickly as students are introduced to a wide variety of complex and immersive topics over thirteen weeks.
Rensselaer Polytechnic Institute - Malware Analysis This course will introduce students to modern malware analysis techniques through readings and hands-on interactive analysis of real-world samples. After taking this course students will be equipped with the skills to analyze advanced contemporary malware using both static and dynamic analysis.
Phoenix miner-Released in 2011. Free and open source. - Poclbm: Windows, Mac : Python/OpenCL GPU miner (GUI (Windows and MacOS X)) - Poclbm-mod-More efficient version of Poclbm (GUI) - Pyminer-Released in 2011. CPU mining client. - Remote Miner-Open source Bitcoin mining software for pooled mining. Works with RPC Miner. - RPC Miner: Windows Bitcoin Core Get BTC Core. Bitcoin Core is a Bitcoin full node wallet, meaning it downloads the entire Bitcoin blockchain. It is the most private Bitcoin wallet although it takes patience and quite some time to setup. You also need a reliable internet connection, as well plenty of badwidth and hard drive space. Supported Platforms: MacOS, Linux CGMINER – This is a multi-threaded multi-pool GPU, FPGA and ASIC Bitcoin miner with ATI GPU monitoring, (over)clocking and fanspeed support for bitcoin and derivative coins. 50Miner – A GUI frontend for Windows(Poclbm, Phoenix, DiabloMiner) BTCMiner – Bitcoin Miner for ZTEX FPGA Boards; Bit Moose – Run Miners as a Windows Service. MinePeon: Open source and may need WinDisk32Imager.. EasyMiner: A GUI based miner for Windows, Linux and Android.EasyMiner acts as a convenient wrapper for the built in CG; BFGminer softwares. It auto configures your Bitcoin miners and provides performance graphs to for easy visualization of your Bitcoin mining activity. 4. Bitcoin Core – A full Bitcoin node. Platforms: Mac OS, Linux, and Windows. All of the wallets I’ve covered so far are known as SPV wallets or lite wallets. This means that they don’t have a full copy of the blockchain in order to verify transactions – they rely on other computers on the network to give them transaction information.. Bitcoin Core is a full node Bitcoin wallet.
sudo add-apt-repository ppa:bitcoin/bitcoin sudo apt-get update sudo apt-get install bitcoin-qt bitcoind Linux terminal new stuff: clear, ll, cd, touch, echo, cat, shutdown www.bitcoinhackers.org Open source trading client for Mt.Gox and BTC-e written in Qt. This software helps you to open and close Mt.Gox orders very fast. Real time data monitoring. Support trading rules for buy/sell ... Connect a PLC to an OPC UA server using the UaExpert client and PLCnext Engineer, the PLC engineering software by Phoenix Contact for both IEC 61131-3 and high-level programming languages. Phoenix Miner Setup [Easy Tutorial 2020] Ethereum Mining ... (start.sh for Linux) file to launch the miner. ... How to earn through mining bitcoin ethereum dash zcash & comparison between gpu ... Dr Peter Steinmetz gives a presentation for the Phoenix Blockchain meetup on Bitcoin basics and how some commands work in the Qt client.