CIS6395: Incident
Response Technologies
(Fall 2021)
Home Schedule notes Assignment
Instructor: Dr. Cliff Zou (HEC-243), 407-823-5015, changchun.zou@ucf.edu
Course Time: MoWe 10:30am-11:45am, CB1-218 (real-time lecture and zoom recording)
Office Hour: MoWe 12pm - 1:30pm, in HEC243, You can come to my office, call office phone (407-823-5015) or join office hour Zoom meeting via webcourse’s Zoom link
Course Classroom: CB1-218 classroom is used for in-campus lecturing; at the same time, we rely on Zoom-based real-time lecture recording to provide real-time remote participation and recorded lecture videos for online students
Prerequisite:
CGS 5131 and CNT 6418, or C.I.
Knowledge on computer architecture, data structure, and networking;
Knowledge of basic usage of Linux machine.
Textbook:
There is
no require textbook.
We will use research papers and some contents from the
following reference books.
1. The Basics of Hacking and Penetration
Testing (2nd edition) by Patrick Engebretson (2013). ISBN-10: 0124116442,
ISBN-13: 978-0124116443
2. Network Forensics: Tracking Hackers through
Cyberspace, by Sherri Davidoff and Jonathan Ham (2012). ISBN-10: 0132564718,
ISBN-13: 978-0132564717
Zoom-based
real-time lecturing and video streaming:
We will use
WebCourse’s integrated Zoom system for real-time online lecturing and video
streaming. Both face-to-face session (0V01) and online session (0V61)
students have the freedom to either join or not join in the real-time Zoom
lecturing on the lecture time via the “Zoom” tab link in the webcourse
(Monday/Wednesday 10:30am-11:45am). Everyone can access the recorded lecture
video via the “Zoom” tab link in Webcourse after each lecture time (clicking
the ‘Cloud Recordings’ tab). Webcourse will also be used for lecture content
dissemination, assignment release and submission.
Course Learning Objectives:
(a) Understand basic knowledge and procedure on
handling with cyber security attack, data breach, data damage incidents;
(b) Able to conduct basic forensic analysis of Windows and Linux systems;
(c) Able to use popular tools in analyzing compromised systems and
conducting static and dynamic malware analysis;
(d) Able to conduct
basic penetration testing (information gathering and exploitation);
(e)
Able to use Wireshark for network traffic capture and analysis, and use
Splunk software to process and analyze security logs.
Course Outline of Topics:
- Course outline and introduction
- Background
knowledge: Basic Networking Principles
- Get familiar with VirtualBox
Virtual Machine software and installation of Kali Linux VM
- Linux basic
usage and administration
- Network traffic monitoring and Wireshark usage
-
Malware Incident Response
- Static Analysis
- Dynamic Analysis
- Basic Reverse Engineering
- Incident Response and Event
Log Analysis
- Use Splunk for Incident Response and Event Log Analysis
-
Penetration Testing
- Information gathering
- Scanning
- Exploitation
- System hardening: example of
securing a vulnerable virtual machine system
Grading:
+/- grading system will be used as A, A-, B+, B, etc. The tentative weights are as follows:
Assessment
Percent of Final Grade
Regular Assignments (4)
60%
Mid-term Exam
(1)
20%
Final Exam (1)
20%