[... return to main page]

The following are some outline study areas [View the study guide]:

Software Security [Software Security]

  1. Understands the usage of the Global Assembly Cache in .NET.
  2. Understands security settings for ASP.NET Web (Web.Config).
  3. Defines the usage of the strong name used for in .NET assemblies.
  4. Understand the problems caused by "DLL Hell", and how it can be overcome with .NET.
  5. Understands the trends from port-based security with thick clients to Web-based thin-clients.
  6. Understands the methods used to obfuscate a .NET assembly.
  7. Understands how Cardspace is used within an IP/RP infrastructure.
  8. Defines best-practice for software security (see Software lecture).
  9. Outlines the usage of role-based security in .NET.

Network Security [Network Security]

  1. Outlines the usage of NAT/PAT. This includes the advantages of using NAT/PAT
  2. Outlines the usage of proxies, such as for the trace left from external access
  3. Defines the creation of an ACL to block/allow access.

Forensic Computing [Forensic Computing][Forensic Computing Part 2].

  1. Understands multi-factor authentication (Section 7.5).
  2. Understands binary to text conversion format (Base-64/Hex).
  3. Defines the usage and the operation of the OTP (One-Time Password) (Section 7.6)
  4. Performs an analysis of a network trace for forensic purposes (see Forensic Computing Lecture 2)
  5. Creates a Winpcap filter to capture certain types of data. (see Forensic Computing Lecture 2)
  6. Understand the main stages of a digital forensics investigation.
  7. Define the time stamp format for Windows (two questions).
  8. Define how an investigation uses the Registry (two questions).
  9. Define the usage of Web browser history usage in forensic investigations (two questions).

Questions in total = 30