Computer Network Security Alternate Laboratory Exercises

The following labs are based on Michael E. Whitmann e, Herbert J. Mattord and David M. Shackleford ‘s Hands-on Information Security Lab Manual, Second Edition, Course Technologies, 2006.

Weeks 1- 2: Foot printing Labs.

After teaching chapter 1, students are in position to do labs that will teach them how to determine exactly what information is in their networks on both Windows and Linux systems. Since all 1-A (Windows) labs are approximately 25-45 minutes and all 1-B (Linux) labs are 30-60 minutes, the instructor should, as one option choose to use one week for Windows labs and the second week for Linux.

Weeks 3 - 4: Scanning and Enumeration Labs.

These labs come after covering chapters 2 and 3 of the textbook when students are in a position to move around the network gathering information about the network using scanning and enumeration tools. Again we suggest, as one option, that one week be devoted to Windows labs and the following week to Linux/Unix. With Unix Linux, the instructor can also use Nessus in addition to Nmap.

Weeks 5 - 6: Operating System Vulnerabilities and Resolutions Labs.

These labs come after covering chapters 4 on system vulnerabilities. At this point students are in a position to learn about vulnerabilities in their operating systems: Windows, Unix and Linux and their variants. Some of these labs may require additional tools that may not be available in the lab ( especially Windows). The instructor may choose those labs whose tools are either available or freely downloadable. Again we suggest, as one option, that one week be devoted to Windows labs and the following week to Linux/Unix.

Week7: Information Security Management Labs.

It is best to start these labs after covering chapters 5, 6 and 7 of the textbook. The exercises consist of scenarios and a series of questions and may not require lab tools.

Weeks 8 - 9: File System Security and Cryptography Labs.

These labs should be done during or after chapters 9 and 10 of the textbook are covered. Again the instructor may choose Windows labs for the first week and the Unix/Linux labs for the following week.

Week 10 - 11: Network Security Tools and Technologies Labs.

Do these labs during or after covering chapters 11 and 12 of the textbook. We suggest, as one option, that one week be devoted to Windows labs and the following week to Linux/Unix. These labs are very exciting to students and we recommend that the instructor spends some time on them.

Weeks 12- 13: Security Maintenance Labs.

Do these labs after teaching chapter 14 of the textbook. Like before you may allocate 5-A labs for one week and the following cover 5-B labs.

Weeks 14- 15: Computer Forensics Labs.

These are specialized labs that may required expensive tools. However, there are some free Linux/Unix downloadable tools. So if time allows and tools are available assign these labs after teaching chapter 13 of the textbook.

Laboratory Exercise Summary

After using this lab manual as a supplement to Kizza’s Computer Network Security, we were pleased with the responses from students and the smooth way the labs went. The supplement was also useful in giving the instructor the option to mix and match Unix, Linux and Windows labs in the ratio the instructor is comfortable with.